logo
Overkill Security  Because Nothing Says 'Security' Like a Dozen Firewalls and a Biometric Scanner
О проекте Просмотр Уровни подписки Фильтры Обновления проекта Контакты Поделиться Метки
Все проекты
О проекте
A blog about all things techy! Not too much hype, just a lot of cool analysis and insight from different sources.

📌Not sure what level is suitable for you? Check this explanation https://sponsr.ru/overkill_security/55291/Paid_Content/

The main categories of materials — use tags:
📌news
📌digest

QA — directly or via email overkill_qa@outlook.com
Публикации, доступные бесплатно
Уровни подписки
Единоразовый платёж

Your donation fuels our mission to provide cutting-edge cybersecurity research, in-depth tutorials, and expert insights. Support our work today to empower the community with even more valuable content.

*no refund, no paid content

Помочь проекту
Promo 750₽ месяц

For a limited time, we're offering our Level "Regular" subscription at an unbeatable price—50% off!

Dive into the latest trends and updates in the cybersecurity world with our in-depth articles and expert insights

Offer valid until the end of this month.

Оформить подписку
Regular Reader 1 500₽ месяц 16 200₽ год
(-10%)
При подписке на год для вас действует 10% скидка. 10% основная скидка и 0% доп. скидка за ваш уровень на проекте Overkill Security

Ideal for regular readers who are interested in staying informed about the latest trends and updates in the cybersecurity world without.

Оформить подписку
Pro Reader 3 000₽ месяц 30 600₽ год
(-15%)
При подписке на год для вас действует 15% скидка. 15% основная скидка и 0% доп. скидка за ваш уровень на проекте Overkill Security

Designed for IT professionals, cybersecurity experts, and enthusiasts who seek deeper insights and more comprehensive resources. + Q&A

Оформить подписку
Фильтры
Обновления проекта
Поделиться
Метки
overkillsecurity 93 overkillsecuritypdf 46 news 45 vulnerability 9 malware 8 research 8 IoT 7 Cyber Attacks 6 Digest 6 Monthly Digest 6 phishing 6 unpacking 6 Forensics 5 Ransomware 5 nsa 4 Energy Consumption 3 fbi 3 IoMT 3 medical 3 ai 2 authentication 2 av 2 battery 2 Buffer Overflow 2 console architecture 2 cve 2 cyber security 2 energy 2 Google 2 incident response 2 MITM 2 mqtt 2 Passkeys 2 Retro 2 Velociraptor 2 Vintage 2 vmware 2 windows 2 1981 1 5g network research 1 8-bit 1 Ad Removal 1 Ad-Free Experience 1 adapt tactics 1 ADCS 1 AlphV 1 AMSI 1 android 1 Android15 1 AnonSudan 1 antiPhishing 1 AntiPhishStack 1 antivirus 1 Apple 1 Atlassian 1 Attack 1 AttackGen 1 BatBadBut 1 Behavioral Analytics 1 BianLian 1 bias 1 Biocybersecurity 1 Biometric 1 bite 1 bitlocker 1 bitlocker bypass 1 Black Lotus Labs 1 blizzard 1 botnet 1 Browser Data Theft 1 BucketLoot 1 CellularSecurity 1 checkpoint 1 china 1 chisel 1 CloudSecurity 1 CloudStorage 1 content 1 content category 1 cpu 1 Credential Dumping 1 CVE-2023-22518 1 CVE-2023-35080 1 CVE-2023-38043 1 CVE-2023-38543 1 CVE-2024-0204 1 CVE-2024-21111 1 CVE-2024-21345 1 cve-2024-21447 1 CVE-2024-24919 1 CVE-2024-26218 1 cve-2024-27129 1 cve-2024-27130 1 cve-2024-27131 1 cve-2024-3400 1 cvss 1 Cyber Toufan Al-Aqsa 1 cybersecurity 1 D-Link 1 dark pink apt 1 data leakage 1 dcrat 1 Demoscene 1 DevSecOps 1 Dex 1 disassembler 1 DOS 1 edge routers 1 EDR 1 Embedded systems 1 Employee Training 1 EntraID 1 ESC8 1 Essential Eight Maturity Model 1 Event ID 4663 1 Event ID 4688 1 Event ID 5145 1 Evilginx 1 EvilLsassTwin 1 Facebook 1 FBI IC3 1 FIDO2 1 Firebase 1 Firmware 1 Fortra's GoAnywhere MFT 1 france 1 FraudDetection 1 fuxnet 1 game console 1 gamification 1 GeminiNanoAI 1 genzai 1 go 1 GoogleIO2024 1 GooglePlayProtect 1 GoPhish 1 gpu 1 ICS 1 ICSpector 1 IDA 1 IncidentResponse 1 Industrial Control Systems 1 jetbrains 1 KASLR 1 KillNet 1 LeftOverLocals 1 lg smart tv 1 Living Off the Land 1 lockbit 1 LOTL 1 LSASS 1 m-trends 1 Machine Learning Integration 1 Mallox 1 MalPurifier 1 mandiant 1 Maturity Model 1 MediHunt 1 Meta Pixel 1 ML 1 mobile network analysis 1 nes 1 nexus 1 Nim 1 Nimfilt 1 NtQueryInformationThread 1 OFGB 1 oracle 1 paid content 1 panos 1 Passwordless 1 Phishing Resilience 1 PingFederate 1 Platform Lock-in Tool 1 PlayIntegrityAPI 1 PlayStation 1 playstation 2 1 playstation 3 1 plc 1 Privilege Escalation 1 ps2 1 ps3 1 PulseVPN 1 qcsuper 1 qemu 1 qualcomm diag protocol 1 radio frame capture 1 Raytracing 1 Real-time Attack Detection 1 Red Team 1 Registry Modification 1 Risk Mitigation 1 RiskManagement 1 rodrigo copetti 1 rooted android devices 1 Router 1 rust 1 Sagemcom 1 sandworm 1 ScamCallDetection 1 Security Awareness 1 session hijacking 1 SharpADWS 1 SharpTerminator 1 shellcode 1 SIEM 1 Siemens 1 skimming 1 Smart Devices 1 snes 1 soho 1 SSO 1 stack overflow 1 TA547 1 TDDP 1 telecom security 1 Telegram 1 telerik 1 TeleTracker 1 Terminator 1 Threat 1 threat intelligence 1 threat intelligence analysis 1 Threat Simulation 1 tool 1 toolkit 1 tp-link 1 ubiquiti 1 UK 1 UserManagerEoP 1 uta0218 1 virtualbox 1 VPN 1 vu 1 wargame 1 Web Authentication 1 WebAuthn 1 webos 1 What2Log 1 Windows 11 1 Windows Kernel 1 Windstream 1 women 1 WSUS 1 wt-2024-0004 1 wt-2024-0005 1 wt-2024-0006 1 xbox 1 xbox 360 1 xbox original 1 xss 1 Yubico 1 Z80A 1 ZX Spectrum 1 Больше тегов
Читать: 2+ мин
logo Overkill Security

Skipping Authentication: Telerik Report Server’s New Feature?

The ‎Progress‏ ‎Telerik ‎Report ‎Server ‎pre-authenticated ‎Remote‏ ‎Code ‎Execution‏ ‎(RCE)‏ ‎chain, ‎identified ‎as‏ ‎CVE-2024-4358 and ‎CVE-2024-1800, involves‏ ‎a ‎critical ‎vulnerability ‎that‏ ‎allows‏ ‎unauthenticated ‎attackers‏ ‎to ‎execute‏ ‎arbitrary ‎code ‎on ‎affected ‎servers.

Attack‏ ‎Flow

📌Initial‏ ‎Access: The ‎attacker‏ ‎identifies ‎a‏ ‎vulnerable ‎Telerik ‎Report ‎Server ‎instance.

📌Exploitation‏ ‎of‏ ‎CVE-2024-4358: The‏ ‎attacker ‎sends‏ ‎a ‎crafted‏ ‎request ‎to‏ ‎the‏ ‎/Startup/Register ‎endpoint‏ ‎to ‎create ‎a ‎new ‎administrator‏ ‎account.

📌Privilege ‎Escalation:‏ ‎The‏ ‎attacker ‎logs ‎in‏ ‎using ‎the‏ ‎newly ‎created ‎administrator ‎account.

📌Exploitation‏ ‎of‏ ‎CVE-2024-1800: The ‎attacker‏ ‎creates ‎a‏ ‎malicious ‎report ‎that ‎exploits ‎the‏ ‎deserialization‏ ‎vulnerability ‎to‏ ‎execute ‎arbitrary‏ ‎code.

📌Command ‎Execution: ‎The ‎attacker ‎executes‏ ‎arbitrary‏ ‎commands‏ ‎on ‎the‏ ‎server, ‎achieving‏ ‎remote ‎code‏ ‎execution.


Attack‏ ‎Scenario

Target ‎Identification:

📌The‏ ‎attacker ‎identifies ‎a ‎vulnerable ‎instance‏ ‎of ‎the‏ ‎Telerik‏ ‎Report ‎Server, ‎typically‏ ‎by ‎scanning‏ ‎for ‎publicly ‎exposed ‎instances‏ ‎using‏ ‎tools ‎like‏ ‎Shodan.

Authentication ‎Bypass‏ ‎(CVE-2024-4358):

📌The ‎attacker ‎exploits ‎an ‎authentication‏ ‎bypass‏ ‎vulnerability ‎in‏ ‎the ‎Telerik‏ ‎Report ‎Server’s ‎setup ‎wizard. ‎This‏ ‎vulnerability‏ ‎allows‏ ‎the ‎attacker‏ ‎to ‎create‏ ‎a ‎new‏ ‎administrator‏ ‎account ‎without‏ ‎any ‎prior ‎authentication.

📌The ‎specific ‎endpoint‏ ‎exploited ‎is‏ ‎Telerik.ReportServer.Web.dll!‏ ‎Telerik.ReportServer.Web.Controllers.StartupController.Register, ‎which ‎does‏ ‎not ‎verify‏ ‎if ‎the ‎setup ‎process‏ ‎has‏ ‎already ‎been‏ ‎completed.

📌The ‎attacker‏ ‎sends ‎a ‎crafted ‎HTTP ‎request‏ ‎to‏ ‎the ‎/Startup/Register‏ ‎endpoint ‎to‏ ‎create ‎a ‎new ‎administrator ‎account:

curl‏ ‎'http://TARGET_HERE/Startup/Register'‏ ‎-d‏ ‎'Username=USERNAME_HERE& ‎Password=PASSWORD_HERE&‏ ‎ConfirmPassword=PASSWORD_HERE& ‎Email=backdoor%http://40admin.com&‏ ‎FirstName=backdoor& ‎LastName=user'

Account‏ ‎Creation‏ ‎and ‎Authentication:

📌Upon‏ ‎successful ‎exploitation, ‎the ‎attacker ‎gains‏ ‎high-privileged ‎access‏ ‎to‏ ‎the ‎Telerik ‎Report‏ ‎Server ‎by‏ ‎using ‎the ‎newly ‎created‏ ‎administrator‏ ‎account.

📌The ‎attacker‏ ‎logs ‎in‏ ‎using ‎the ‎credentials ‎of ‎the‏ ‎backdoor‏ ‎account ‎created‏ ‎in ‎the‏ ‎previous ‎step.

Deserialization ‎Exploit ‎(CVE-2024-1800):

📌With ‎administrative‏ ‎access,‏ ‎the‏ ‎attacker ‎leverages‏ ‎a ‎deserialization‏ ‎vulnerability ‎in‏ ‎the‏ ‎Telerik ‎Report‏ ‎Server ‎to ‎execute ‎arbitrary ‎code‏ ‎on ‎the‏ ‎server.

📌The‏ ‎attacker ‎creates ‎a‏ ‎malicious ‎report‏ ‎that ‎triggers ‎the ‎deserialization‏ ‎flaw,‏ ‎allowing ‎them‏ ‎to ‎run‏ ‎arbitrary ‎commands ‎on ‎the ‎server.

📌The‏ ‎PoC‏ ‎script ‎automates‏ ‎this ‎process,‏ ‎including ‎generating ‎random ‎usernames ‎and‏ ‎passwords‏ ‎for‏ ‎the ‎backdoor‏ ‎account ‎and‏ ‎creating ‎a‏ ‎malicious‏ ‎report:

python ‎http://CVE-2024-4358.py --target‏ ‎http://192.168.253.128:83 -c ‎«whoami»


Читать: 4+ мин
logo Overkill Security

Hacking the Hippocratic Oath. Forensic Fun with Medical IoT

Читать: 3+ мин
logo Overkill Security

Hacking the Hippocratic Oath. Forensic Fun with Medical IoT [announcement]

this ‎document‏ ‎provides ‎a ‎comprehensive ‎analysis ‎of‏ ‎Medical ‎Internet‏ ‎of‏ ‎Things ‎(IoMT) ‎Forensics,‏ ‎focusing ‎on‏ ‎various ‎critical ‎aspects ‎relevant‏ ‎to‏ ‎the ‎field,‏ ‎including ‎examination‏ ‎of ‎current ‎forensic ‎methodologies ‎tailored‏ ‎for‏ ‎IoT ‎environments,‏ ‎highlighting ‎their‏ ‎adaptability ‎and ‎effectiveness ‎in ‎medical‏ ‎contexts;‏ ‎techniques‏ ‎for ‎acquiring‏ ‎digital ‎evidence‏ ‎from ‎medical‏ ‎IoT‏ ‎devices, ‎considering‏ ‎the ‎unique ‎challenges ‎posed ‎by‏ ‎these ‎devices;‏ ‎exploration‏ ‎of ‎privacy ‎issues‏ ‎and ‎security‏ ‎vulnerabilities ‎inherent ‎in ‎medical‏ ‎IoT‏ ‎systems, ‎and‏ ‎how ‎these‏ ‎impact ‎forensic ‎investigations; ‎review ‎of‏ ‎the‏ ‎tools ‎and‏ ‎technologies ‎used‏ ‎in ‎IoT ‎forensics, ‎with ‎a‏ ‎focus‏ ‎on‏ ‎those ‎applicable‏ ‎to ‎medical‏ ‎devices; ‎analysis‏ ‎of‏ ‎real-world ‎case‏ ‎studies ‎where ‎medical ‎IoT ‎devices‏ ‎played ‎a‏ ‎crucial‏ ‎role ‎in ‎forensic‏ ‎investigations, ‎providing‏ ‎practical ‎insights ‎and ‎lessons‏ ‎learned.

This‏ ‎document ‎offers‏ ‎a ‎high-quality‏ ‎synthesis ‎of ‎the ‎current ‎state‏ ‎of‏ ‎Medical ‎IoT‏ ‎Forensics, ‎making‏ ‎it ‎a ‎valuable ‎resource ‎for‏ ‎security‏ ‎professionals,‏ ‎forensic ‎investigators,‏ ‎and ‎specialists‏ ‎across ‎various‏ ‎industries.‏ ‎The ‎insights‏ ‎provided ‎can ‎help ‎enhance ‎the‏ ‎understanding ‎and‏ ‎implementation‏ ‎of ‎effective ‎forensic‏ ‎practices ‎in‏ ‎the ‎rapidly ‎evolving ‎landscape‏ ‎of‏ ‎medical ‎IoT.

Read‏ ‎article/PDF

----

The ‎rapid‏ ‎adoption ‎of ‎the ‎Internet ‎of‏ ‎Things‏ ‎(IoT) ‎in‏ ‎the ‎healthcare‏ ‎industry, ‎known ‎as ‎the ‎Internet‏ ‎of‏ ‎Medical‏ ‎Things ‎(IoMT),‏ ‎has ‎revolutionized‏ ‎patient ‎care‏ ‎and‏ ‎medical ‎operations.‏ ‎IoMT ‎devices, ‎such ‎as ‎wearable‏ ‎health ‎monitors,‏ ‎implantable‏ ‎medical ‎devices, ‎and‏ ‎smart ‎hospital‏ ‎equipment, ‎generate ‎and ‎transmit‏ ‎vast‏ ‎amounts ‎of‏ ‎sensitive ‎data‏ ‎over ‎networks.

Medical ‎IoT ‎network ‎forensics‏ ‎is‏ ‎an ‎emerging‏ ‎field ‎that‏ ‎focuses ‎on ‎the ‎identification, ‎acquisition,‏ ‎analysis,‏ ‎and‏ ‎preservation ‎of‏ ‎digital ‎evidence‏ ‎from ‎IoMT‏ ‎devices‏ ‎and ‎networks.‏ ‎It ‎plays ‎a ‎crucial ‎role‏ ‎in ‎investigating‏ ‎security‏ ‎incidents, ‎data ‎breaches,‏ ‎and ‎cyber-attacks‏ ‎targeting ‎healthcare ‎organizations. ‎The‏ ‎unique‏ ‎nature ‎of‏ ‎IoMT ‎systems,‏ ‎with ‎their ‎diverse ‎range ‎of‏ ‎devices,‏ ‎communication ‎protocols,‏ ‎and ‎data‏ ‎formats, ‎presents ‎significant ‎challenges ‎for‏ ‎traditional‏ ‎digital‏ ‎forensics ‎techniques.

The‏ ‎primary ‎objectives‏ ‎of ‎medical‏ ‎IoT‏ ‎network ‎forensics‏ ‎are:

📌 Incident ‎Response: Rapidly ‎respond ‎to ‎security‏ ‎incidents ‎by‏ ‎identifying‏ ‎the ‎source, ‎scope,‏ ‎and ‎impact‏ ‎of ‎the ‎attack, ‎and‏ ‎gathering‏ ‎evidence ‎to‏ ‎support ‎legal‏ ‎proceedings ‎or ‎regulatory ‎compliance.

📌 Evidence ‎Acquisition: Develop‏ ‎specialized‏ ‎techniques ‎to‏ ‎acquire ‎and‏ ‎preserve ‎digital ‎evidence ‎from ‎IoMT‏ ‎devices,‏ ‎networks,‏ ‎and ‎cloud-based‏ ‎systems ‎while‏ ‎maintaining ‎data‏ ‎integrity‏ ‎and ‎chain‏ ‎of ‎custody.

📌 Data ‎Analysis: ‎Analyze ‎the‏ ‎collected ‎data,‏ ‎including‏ ‎network ‎traffic, ‎device‏ ‎logs, ‎and‏ ‎sensor ‎readings, ‎to ‎reconstruct‏ ‎the‏ ‎events ‎leading‏ ‎to ‎the‏ ‎incident ‎and ‎identify ‎potential ‎vulnerabilities‏ ‎or‏ ‎attack ‎vectors.

📌 Threat‏ ‎Intelligence: ‎Leverage‏ ‎the ‎insights ‎gained ‎from ‎forensic‏ ‎investigations‏ ‎to‏ ‎enhance ‎threat‏ ‎intelligence, ‎improve‏ ‎security ‎measures,‏ ‎and‏ ‎prevent ‎future‏ ‎attacks ‎on ‎IoMT ‎systems.

Medical ‎IoT‏ ‎network ‎forensics‏ ‎requires‏ ‎a ‎multidisciplinary ‎approach,‏ ‎combining ‎expertise‏ ‎in ‎digital ‎forensics, ‎cybersecurity,‏ ‎healthcare‏ ‎regulations, ‎and‏ ‎IoT ‎technologies.‏ ‎Forensic ‎investigators ‎must ‎navigate ‎the‏ ‎complexities‏ ‎of ‎IoMT‏ ‎systems, ‎including‏ ‎device ‎heterogeneity, ‎resource ‎constraints, ‎proprietary‏ ‎protocols,‏ ‎and‏ ‎the ‎need‏ ‎to ‎maintain‏ ‎patient ‎privacy‏ ‎and‏ ‎data ‎confidentiality.


Читать: 2+ мин
logo Overkill Security

The Dark Side of LSASS: How Evil Twins Bypass Security Measures

The ‎EvilLsassTwin‏ ‎project ‎on ‎GitHub, found ‎in ‎the‏ ‎Nimperiments ‎repository,‏ ‎focuses‏ ‎on ‎a ‎specific‏ ‎technique ‎for‏ ‎extracting ‎credentials ‎from ‎the‏ ‎Local‏ ‎Security ‎Authority‏ ‎Subsystem ‎Service‏ ‎(LSASS) ‎process ‎on ‎Windows ‎systems.

📌Objective: The‏ ‎project‏ ‎aims ‎to‏ ‎demonstrate ‎a‏ ‎method ‎for ‎credential ‎dumping ‎from‏ ‎the‏ ‎LSASS‏ ‎process, ‎which‏ ‎is ‎a‏ ‎common ‎target‏ ‎for‏ ‎attackers ‎seeking‏ ‎to ‎obtain ‎sensitive ‎information ‎such‏ ‎as ‎passwords‏ ‎and‏ ‎tokens.

📌Technique: The ‎method ‎involves‏ ‎creating ‎a‏ ‎«twin» ‎of ‎the ‎LSASS‏ ‎process.‏ ‎This ‎twin‏ ‎process ‎is‏ ‎used ‎to ‎bypass ‎certain ‎security‏ ‎mechanisms‏ ‎that ‎protect‏ ‎the ‎original‏ ‎LSASS ‎process ‎from ‎being ‎accessed‏ ‎directly.

📌Implementation: The‏ ‎project‏ ‎provides ‎a‏ ‎detailed ‎implementation‏ ‎of ‎the‏ ‎technique,‏ ‎including ‎the‏ ‎necessary ‎code ‎and ‎steps ‎to‏ ‎replicate ‎the‏ ‎process.‏ ‎This ‎includes ‎creating‏ ‎a ‎duplicate‏ ‎of ‎the ‎LSASS ‎process,‏ ‎using‏ ‎the ‎duplicate‏ ‎process ‎to‏ ‎read ‎the ‎memory ‎of ‎the‏ ‎original‏ ‎LSASS ‎process,‏ ‎extracting ‎credentials‏ ‎from ‎the ‎memory ‎of ‎the‏ ‎original‏ ‎LSASS‏ ‎process.

📌Security ‎Implications:‏ ‎The ‎project‏ ‎highlights ‎the‏ ‎potential‏ ‎security ‎risks‏ ‎associated ‎with ‎this ‎technique, ‎emphasizing‏ ‎the ‎need‏ ‎for‏ ‎robust ‎security ‎measures‏ ‎to ‎protect‏ ‎the ‎LSASS ‎process ‎and‏ ‎prevent‏ ‎unauthorized ‎access.

📌Code‏ ‎Availability: The ‎full‏ ‎source ‎code ‎and ‎documentation ‎are‏ ‎available‏ ‎on ‎the‏ ‎GitHub ‎page,‏ ‎allowing ‎users ‎to ‎explore ‎and‏ ‎understand‏ ‎the‏ ‎technique ‎in‏ ‎detail.

Industry ‎Impact‏ ‎and ‎Consequences

📌Increased‏ ‎Risk‏ ‎of ‎Credential‏ ‎Theft: The ‎EvilLsassTwin ‎technique ‎highlights ‎the‏ ‎vulnerability ‎of‏ ‎the‏ ‎LSASS ‎process, ‎which‏ ‎stores ‎sensitive‏ ‎information ‎such ‎as ‎encrypted‏ ‎passwords,‏ ‎NT ‎hashes,‏ ‎LM ‎hashes,‏ ‎and ‎Kerberos ‎tickets. ‎Attackers ‎exploiting‏ ‎this‏ ‎technique ‎can‏ ‎gain ‎unauthorized‏ ‎access ‎to ‎these ‎credentials, ‎leading‏ ‎to‏ ‎potential‏ ‎data ‎breaches‏ ‎and ‎unauthorized‏ ‎access ‎to‏ ‎critical‏ ‎systems.

📌Lateral ‎Movement‏ ‎and ‎Privilege ‎Escalation: ‎Once ‎attackers‏ ‎obtain ‎credentials‏ ‎from‏ ‎the ‎LSASS ‎process,‏ ‎they ‎can‏ ‎use ‎them ‎to ‎move‏ ‎laterally‏ ‎within ‎the‏ ‎network, ‎escalating‏ ‎their ‎privileges ‎and ‎compromising ‎additional‏ ‎systems.‏ ‎This ‎can‏ ‎lead ‎to‏ ‎a ‎widespread ‎compromise ‎of ‎the‏ ‎network,‏ ‎making‏ ‎it ‎difficult‏ ‎for ‎organizations‏ ‎to ‎contain‏ ‎the‏ ‎attack.

📌Real-World ‎Examples‏ ‎and ‎Case ‎Studies: ‎The ‎BlackCat‏ ‎ransomware ‎attack‏ ‎is‏ ‎a ‎notable ‎example‏ ‎where ‎attackers‏ ‎used ‎LSASS ‎memory ‎dumping‏ ‎to‏ ‎extract ‎credentials.‏ ‎They ‎modified‏ ‎the ‎WDigest ‎configuration ‎to ‎read‏ ‎user‏ ‎account ‎passwords‏ ‎and ‎used‏ ‎tools ‎like ‎Mimikatz ‎to ‎perform‏ ‎the‏ ‎dump,‏ ‎enabling ‎them‏ ‎to ‎gain‏ ‎further ‎access‏ ‎and‏ ‎move ‎laterally‏ ‎within ‎the ‎network.

Читать: 8+ мин
logo Overkill Security

Leveraging Energy Consumption Patterns for Cyberattack Detection in IoT Systems

Читать: 6+ мин
logo Overkill Security

Leveraging Energy Consumption Patterns for Cyberattack Detection in IoT Systems [announcement]

This ‎document‏ ‎provides ‎a ‎comprehensive ‎analysis ‎of‏ ‎the ‎energy‏ ‎consumption‏ ‎of ‎smart ‎devices‏ ‎during ‎cyberattacks,‏ ‎focusing ‎on ‎various ‎aspects‏ ‎critical‏ ‎to ‎understanding‏ ‎and ‎mitigating‏ ‎these ‎threats: ‎types ‎of ‎cyberattacks,‏ ‎detection‏ ‎techniques, ‎benefits‏ ‎and ‎drawbacks,‏ ‎applicability ‎across ‎industries, ‎integration ‎options.

This‏ ‎qualitative‏ ‎analysis‏ ‎provides ‎valuable‏ ‎insights ‎for‏ ‎cybersecurity ‎professionals,‏ ‎IoT‏ ‎specialists, ‎and‏ ‎industry ‎stakeholders. ‎The ‎analysis ‎is‏ ‎beneficial ‎for‏ ‎enhancing‏ ‎the ‎security ‎and‏ ‎resilience ‎of‏ ‎IoT ‎systems, ‎ensuring ‎the‏ ‎longevity‏ ‎and ‎performance‏ ‎of ‎smart‏ ‎devices, ‎and ‎addressing ‎the ‎economic‏ ‎and‏ ‎environmental ‎implications‏ ‎of ‎increased‏ ‎energy ‎consumption ‎during ‎cyberattacks. ‎By‏ ‎leveraging‏ ‎advanced‏ ‎detection ‎techniques‏ ‎and ‎integrating‏ ‎them ‎with‏ ‎existing‏ ‎security ‎measures,‏ ‎organizations ‎can ‎better ‎protect ‎their‏ ‎IoT ‎infrastructure‏ ‎from‏ ‎evolving ‎cyber ‎threats.

Read‏ ‎the ‎article/PDF

----

The‏ ‎proliferation ‎of ‎smart ‎devices‏ ‎and‏ ‎the ‎Internet‏ ‎of ‎Things‏ ‎(IoT) ‎has ‎revolutionized ‎various ‎aspects‏ ‎of‏ ‎modern ‎life,‏ ‎from ‎home‏ ‎automation ‎to ‎industrial ‎control ‎systems.‏ ‎However,‏ ‎this‏ ‎technological ‎advancement‏ ‎has ‎also‏ ‎introduced ‎new‏ ‎challenges,‏ ‎particularly ‎in‏ ‎the ‎realm ‎of ‎cybersecurity. ‎One‏ ‎critical ‎area‏ ‎of‏ ‎concern ‎is ‎the‏ ‎energy ‎consumption‏ ‎of ‎smart ‎devices ‎during‏ ‎cyberattacks,‏ ‎which ‎can‏ ‎have ‎far-reaching‏ ‎implications ‎for ‎device ‎performance, ‎longevity,‏ ‎and‏ ‎overall ‎system‏ ‎resilience.

Cyberattacks ‎on‏ ‎IoT ‎devices ‎(DDoS ‎attacks, ‎malware‏ ‎infections,‏ ‎botnets,‏ ‎ransomware, ‎false‏ ‎data ‎injection,‏ ‎energy ‎consumption‏ ‎attacks,‏ ‎and ‎cryptomining‏ ‎attacks) ‎can ‎significantly ‎impact ‎the‏ ‎energy ‎consumption‏ ‎patterns‏ ‎of ‎compromised ‎devices,‏ ‎leading ‎to‏ ‎abnormal ‎spikes, ‎deviations, ‎or‏ ‎excessive‏ ‎power ‎usage.

Monitoring‏ ‎and ‎analyzing‏ ‎energy ‎consumption ‎data ‎has ‎emerged‏ ‎as‏ ‎a ‎promising‏ ‎approach ‎for‏ ‎detecting ‎and ‎mitigating ‎these ‎cyberattacks.‏ ‎By‏ ‎establishing‏ ‎baselines ‎for‏ ‎normal ‎energy‏ ‎usage ‎patterns‏ ‎and‏ ‎employing ‎anomaly‏ ‎detection ‎techniques, ‎deviations ‎from ‎expected‏ ‎behavior ‎can‏ ‎be‏ ‎identified, ‎potentially ‎indicating‏ ‎the ‎presence‏ ‎of ‎malicious ‎activities. ‎Machine‏ ‎learning‏ ‎algorithms ‎have‏ ‎demonstrated ‎remarkable‏ ‎capabilities ‎in ‎detecting ‎anomalies ‎and‏ ‎classifying‏ ‎attack ‎types‏ ‎based ‎on‏ ‎energy ‎consumption ‎footprints.

The ‎importance ‎of‏ ‎addressing‏ ‎energy‏ ‎consumption ‎during‏ ‎cyberattacks ‎is‏ ‎multifaceted. ‎Firstly,‏ ‎it‏ ‎enables ‎early‏ ‎detection ‎and ‎response ‎to ‎potential‏ ‎threats, ‎mitigating‏ ‎the‏ ‎impact ‎of ‎attacks‏ ‎and ‎ensuring‏ ‎the ‎continued ‎functionality ‎of‏ ‎critical‏ ‎systems. ‎Secondly,‏ ‎it ‎contributes‏ ‎to ‎the ‎overall ‎longevity ‎and‏ ‎performance‏ ‎of ‎IoT‏ ‎devices, ‎as‏ ‎excessive ‎energy ‎consumption ‎can ‎lead‏ ‎to‏ ‎overheating,‏ ‎reduced ‎operational‏ ‎efficiency, ‎and‏ ‎shortened ‎device‏ ‎lifespan.‏ ‎Thirdly, ‎it‏ ‎has ‎economic ‎and ‎environmental ‎implications,‏ ‎as ‎increased‏ ‎energy‏ ‎consumption ‎translates ‎to‏ ‎higher ‎operational‏ ‎costs ‎and ‎potentially ‎greater‏ ‎carbon‏ ‎emissions, ‎particularly‏ ‎in ‎large-scale‏ ‎IoT ‎deployments.

Furthermore, ‎the ‎integration ‎of‏ ‎IoT‏ ‎devices ‎into‏ ‎critical ‎infrastructure,‏ ‎such ‎as ‎smart ‎grids, ‎industrial‏ ‎control‏ ‎systems,‏ ‎and ‎healthcare‏ ‎systems, ‎heightens‏ ‎the ‎importance‏ ‎of‏ ‎addressing ‎energy‏ ‎consumption ‎during ‎cyberattacks. ‎Compromised ‎devices‏ ‎in ‎these‏ ‎environments‏ ‎can ‎disrupt ‎the‏ ‎balance ‎and‏ ‎operation ‎of ‎entire ‎systems,‏ ‎leading‏ ‎to ‎inefficiencies,‏ ‎potential ‎service‏ ‎disruptions, ‎and ‎even ‎safety ‎concerns.

ENERGY‏ ‎CONSUMPTION‏ ‎IMPLICATIONS

📌 Detection ‎and‏ ‎Response ‎to‏ ‎Cyberattacks: Monitoring ‎the ‎energy ‎consumption ‎patterns‏ ‎of‏ ‎IoT‏ ‎devices ‎can‏ ‎serve ‎as‏ ‎an ‎effective‏ ‎method‏ ‎for ‎detecting‏ ‎cyberattacks. ‎Abnormal ‎energy ‎usage ‎can‏ ‎indicate ‎the‏ ‎presence‏ ‎of ‎malicious ‎activities,‏ ‎such ‎as‏ ‎Distributed ‎Denial ‎of ‎Service‏ ‎(DDoS)‏ ‎attacks, ‎which‏ ‎can ‎overload‏ ‎devices ‎and ‎networks, ‎leading ‎to‏ ‎increased‏ ‎energy ‎consumption.‏ ‎By ‎analyzing‏ ‎energy ‎consumption ‎footprints, ‎it ‎is‏ ‎possible‏ ‎to‏ ‎detect ‎and‏ ‎respond ‎to‏ ‎cyberattacks ‎with‏ ‎high‏ ‎efficiency, ‎potentially‏ ‎at ‎levels ‎of ‎about ‎99,88%‏ ‎for ‎detection‏ ‎and‏ ‎about ‎99,66% ‎for‏ ‎localizing ‎malicious‏ ‎software ‎on ‎IoT ‎devices.

📌 Impact‏ ‎on‏ ‎Device ‎Performance‏ ‎and ‎Longevity:‏ ‎Cyberattacks ‎can ‎significantly ‎increase ‎the‏ ‎energy‏ ‎consumption ‎of‏ ‎smart ‎devices,‏ ‎which ‎can, ‎in ‎turn, ‎affect‏ ‎their‏ ‎performance‏ ‎and ‎longevity.‏ ‎For ‎instance,‏ ‎excessive ‎energy‏ ‎usage‏ ‎can ‎lead‏ ‎to ‎overheating, ‎reduced ‎operational ‎efficiency,‏ ‎and ‎in‏ ‎the‏ ‎long ‎term, ‎can‏ ‎shorten ‎the‏ ‎lifespan ‎of ‎the ‎device.‏ ‎This‏ ‎is ‎particularly‏ ‎concerning ‎for‏ ‎devices ‎that ‎are ‎part ‎of‏ ‎critical‏ ‎infrastructure ‎or‏ ‎those ‎that‏ ‎perform ‎essential ‎services.

📌 Impact ‎of ‎Vulnerabilities: The‏ ‎consequences‏ ‎of‏ ‎IoT ‎vulnerabilities‏ ‎are ‎far-reaching,‏ ‎affecting ‎both‏ ‎individual‏ ‎users ‎and‏ ‎organizations. ‎Cyberattacks ‎on ‎IoT ‎devices‏ ‎can ‎lead‏ ‎to‏ ‎privacy ‎breaches, ‎financial‏ ‎losses, ‎and‏ ‎operational ‎disruptions. ‎For ‎instance,‏ ‎the‏ ‎Mirai ‎botnet‏ ‎attack ‎in‏ ‎2016 ‎demonstrated ‎the ‎potential ‎scale‏ ‎and‏ ‎impact ‎of‏ ‎IoT-based ‎DDoS‏ ‎attacks, ‎which ‎disrupted ‎major ‎online‏ ‎services‏ ‎by‏ ‎exploiting ‎insecure‏ ‎IoT ‎devices.

📌 Economic‏ ‎and ‎Environmental‏ ‎Implications:‏ ‎The ‎increased‏ ‎energy ‎consumption ‎of ‎smart ‎devices‏ ‎during ‎cyberattacks‏ ‎has‏ ‎both ‎economic ‎and‏ ‎environmental ‎implications.‏ ‎Economically, ‎it ‎can ‎lead‏ ‎to‏ ‎higher ‎operational‏ ‎costs ‎for‏ ‎businesses ‎and ‎consumers ‎due ‎to‏ ‎increased‏ ‎electricity ‎bills.‏ ‎Environmentally, ‎excessive‏ ‎energy ‎consumption ‎contributes ‎to ‎higher‏ ‎carbon‏ ‎emissions,‏ ‎especially ‎if‏ ‎the ‎energy‏ ‎is ‎sourced‏ ‎from‏ ‎non-renewable ‎resources.‏ ‎This ‎aspect ‎is ‎crucial ‎in‏ ‎the ‎context‏ ‎of‏ ‎global ‎efforts ‎to‏ ‎reduce ‎carbon‏ ‎footprints ‎and ‎combat ‎climate‏ ‎change.

📌 Energy‏ ‎Efficiency ‎Challenges:‏ ‎Despite ‎the‏ ‎benefits, ‎smart ‎homes ‎face ‎significant‏ ‎challenges‏ ‎in ‎terms‏ ‎of ‎energy‏ ‎efficiency. ‎The ‎continuous ‎operation ‎and‏ ‎connectivity‏ ‎of‏ ‎smart ‎devices‏ ‎can ‎lead‏ ‎to ‎high‏ ‎energy‏ ‎consumption. ‎To‏ ‎address ‎this, ‎IoT ‎provides ‎tools‏ ‎for ‎better‏ ‎energy‏ ‎management, ‎such ‎as‏ ‎smart ‎thermostats,‏ ‎lighting ‎systems, ‎and ‎energy-efficient‏ ‎appliances.‏ ‎These ‎tools‏ ‎optimize ‎energy‏ ‎usage ‎based ‎on ‎occupancy, ‎weather‏ ‎conditions,‏ ‎and ‎user‏ ‎preferences, ‎significantly‏ ‎reducing ‎energy ‎waste ‎and ‎lowering‏ ‎energy‏ ‎bills.

📌 Challenges‏ ‎in ‎Smart‏ ‎Grids ‎and‏ ‎Energy ‎Systems:‏ ‎Smart‏ ‎devices ‎are‏ ‎increasingly ‎integrated ‎into ‎smart ‎grids‏ ‎and ‎energy‏ ‎systems,‏ ‎where ‎they ‎play‏ ‎a ‎crucial‏ ‎role ‎in ‎energy ‎management‏ ‎and‏ ‎distribution. ‎Cyberattacks‏ ‎on ‎these‏ ‎devices ‎can ‎disrupt ‎the ‎balance‏ ‎and‏ ‎operation ‎of‏ ‎the ‎entire‏ ‎energy ‎system, ‎leading ‎to ‎inefficiencies,‏ ‎potential‏ ‎blackouts,‏ ‎and ‎compromised‏ ‎energy ‎security.‏ ‎Addressing ‎the‏ ‎energy‏ ‎consumption ‎of‏ ‎smart ‎devices ‎during ‎cyberattacks ‎is‏ ‎therefore ‎vital‏ ‎for‏ ‎ensuring ‎the ‎stability‏ ‎and ‎reliability‏ ‎of ‎smart ‎grids.


Читать: 3+ мин
logo Overkill Security

Check Point’s 'Best Security' Slogan Meets Reality: CVE-2024-24919

The ‎technical‏ ‎details ‎and ‎real-world ‎exploitation ‎of‏ ‎CVE-2024-24919 highlight ‎the‏ ‎critical‏ ‎nature ‎of ‎this‏ ‎vulnerability ‎and‏ ‎the ‎importance ‎of ‎prompt‏ ‎remediation‏ ‎to ‎protect‏ ‎against ‎potential‏ ‎data ‎breaches ‎and ‎network ‎compromises.

Vulnerability‏ ‎Description

📌CVE-2024-24919‏ ‎is ‎an‏ ‎information ‎disclosure‏ ‎vulnerability ‎that ‎allows ‎an ‎unauthenticated‏ ‎remote‏ ‎attacker‏ ‎to ‎read‏ ‎the ‎contents‏ ‎of ‎arbitrary‏ ‎files‏ ‎on ‎the‏ ‎affected ‎appliance.

📌It ‎is ‎categorized ‎as‏ ‎an ‎«Exposure‏ ‎of‏ ‎Sensitive ‎Information ‎to‏ ‎an ‎Unauthorized‏ ‎Actor» ‎vulnerability.

📌The ‎vulnerability ‎affects‏ ‎systems‏ ‎with ‎the‏ ‎Remote ‎Access‏ ‎VPN ‎or ‎Mobile ‎Access ‎software‏ ‎blades‏ ‎enabled.

Affected ‎Products

📌CloudGuard‏ ‎Network

📌Quantum ‎Maestro

📌Quantum‏ ‎Scalable ‎Chassis

📌Quantum ‎Security ‎Gateways

📌Quantum ‎Spark‏ ‎Appliances

Exploitation‏ ‎Details

📌The‏ ‎vulnerability ‎can‏ ‎be ‎exploited‏ ‎by ‎sending‏ ‎a‏ ‎crafted ‎request‏ ‎to ‎the ‎/clients/MyCRL ‎endpoint, ‎which‏ ‎is ‎designed‏ ‎to‏ ‎serve ‎static ‎files‏ ‎from ‎the‏ ‎filesystem.

📌By ‎including ‎path ‎traversal‏ ‎sequences‏ ‎like ‎././etc/passwd‏ ‎in ‎the‏ ‎request ‎body, ‎an ‎attacker ‎can‏ ‎read‏ ‎sensitive ‎files‏ ‎like ‎/etc/shadow‏ ‎to ‎obtain ‎password ‎hashes.

📌The ‎vulnerability‏ ‎allows‏ ‎reading‏ ‎any ‎file‏ ‎on ‎the‏ ‎system, ‎not‏ ‎just‏ ‎specific ‎files‏ ‎mentioned ‎by ‎the ‎vendor.

Proof-of-Concept ‎(PoC)

📌Security‏ ‎researchers ‎have‏ ‎published‏ ‎a ‎public ‎PoC‏ ‎exploit ‎for‏ ‎CVE-2024-24919, ‎providing ‎technical ‎details‏ ‎on‏ ‎how ‎to‏ ‎exploit ‎the‏ ‎vulnerability.

📌The ‎PoC ‎demonstrates ‎the ‎ability‏ ‎to‏ ‎read ‎arbitrary‏ ‎files, ‎including‏ ‎extracting ‎password ‎hashes ‎and ‎other‏ ‎sensitive‏ ‎information.

Observed‏ ‎Exploitation

📌Check ‎Point‏ ‎has ‎observed‏ ‎active ‎exploitation‏ ‎of‏ ‎this ‎vulnerability‏ ‎in ‎the ‎wild ‎since ‎early‏ ‎April ‎2024.

📌Threat‏ ‎actors‏ ‎have ‎been ‎leveraging‏ ‎the ‎vulnerability‏ ‎to ‎extract ‎password ‎hashes,‏ ‎move‏ ‎laterally ‎within‏ ‎networks, ‎and‏ ‎compromise ‎Active ‎Directory ‎servers ‎by‏ ‎extracting‏ ‎the ‎ntds.dit‏ ‎file.

Understanding ‎the‏ ‎Decompiled ‎Code

Initial ‎Analysis:

📌The ‎vulnerable ‎code‏ ‎performs‏ ‎file‏ ‎I/O ‎operations,‏ ‎indicated ‎by‏ ‎references ‎to‏ ‎functions‏ ‎like ‎_fopen‏ ‎and ‎_fread.

📌The ‎code ‎compares ‎the‏ ‎requested ‎URL‏ ‎with‏ ‎a ‎list ‎of‏ ‎hardcoded ‎strings‏ ‎from ‎a ‎string ‎table‏ ‎to‏ ‎determine ‎if‏ ‎the ‎file‏ ‎can ‎be ‎served.

String ‎Comparison ‎Bug:

📌The‏ ‎code‏ ‎uses ‎the‏ ‎strstr ‎function‏ ‎to ‎check ‎if ‎the ‎requested‏ ‎URL‏ ‎contains‏ ‎any ‎of‏ ‎the ‎strings‏ ‎from ‎the‏ ‎table.‏ ‎This ‎function‏ ‎searches ‎for ‎a ‎substring ‎rather‏ ‎than ‎performing‏ ‎a‏ ‎strict ‎comparison.

📌This ‎allows‏ ‎for ‎potential‏ ‎abuse ‎by ‎including ‎a‏ ‎valid‏ ‎substring ‎within‏ ‎a ‎path‏ ‎traversal ‎sequence, ‎such ‎as ‎http://icsweb.cab/././etc/passwd.

Path‏ ‎Traversal‏ ‎Exploitation:

📌The ‎initial‏ ‎attempts ‎to‏ ‎exploit ‎the ‎path ‎traversal ‎by‏ ‎including‏ ‎sequences‏ ‎like ‎././etc/passwd‏ ‎in ‎the‏ ‎URL ‎failed‏ ‎because‏ ‎the ‎OS‏ ‎correctly ‎identified ‎the ‎path ‎as‏ ‎invalid.

📌A ‎second‏ ‎string‏ ‎table ‎was ‎found,‏ ‎containing ‎entries‏ ‎that ‎suggested ‎directory ‎paths,‏ ‎such‏ ‎as ‎CSHELL/.

Successful‏ ‎Exploitation:

📌By ‎crafting‏ ‎a ‎request ‎that ‎included ‎the‏ ‎directory‏ ‎string ‎CSHELL/‏ ‎followed ‎by‏ ‎a ‎path ‎traversal ‎sequence, ‎the‏ ‎researchers‏ ‎were‏ ‎able ‎to‏ ‎bypass ‎the‏ ‎checks.

📌The ‎successful‏ ‎request‏ ‎was:

POST ‎/clients/MyCRL‏ ‎HTTP/1.1
Host: ‎<redacted>
Content-Length: ‎39
aCSHELL/./././././././etc/shadow

📌This ‎request ‎returned‏ ‎the ‎contents‏ ‎of‏ ‎the ‎/etc/shadow ‎file,‏ ‎confirming ‎an‏ ‎arbitrary ‎file ‎read ‎vulnerability.

Implications:

📌The‏ ‎ability‏ ‎to ‎read‏ ‎the ‎/etc/shadow‏ ‎file ‎indicates ‎that ‎the ‎attacker‏ ‎has‏ ‎superuser ‎privileges,‏ ‎allowing ‎them‏ ‎to ‎read ‎any ‎file ‎on‏ ‎the‏ ‎filesystem.

📌This‏ ‎is ‎more‏ ‎severe ‎than‏ ‎the ‎vendor’s‏ ‎advisory,‏ ‎which ‎suggested‏ ‎limited ‎information ‎exposure.


Читать: 2+ мин
logo Overkill Security

CVE-2024-27130 in QNAP: When 'Secure' is Just a Marketing Term

The ‎article‏ ‎«QNAP ‎QTS ‎— ‎QNAPping ‎At‏ ‎The ‎Wheel‏ ‎(CVE-2024-27130‏ ‎and ‎friends)» from ‎WatchTowr‏ ‎Labs ‎provides‏ ‎a ‎detailed ‎analysis ‎of‏ ‎several‏ ‎vulnerabilities ‎found‏ ‎in ‎QNAP‏ ‎NAS ‎devices.

CVE-2024-27130. ‎Stack ‎Buffer ‎Overflow‏ ‎in‏ ‎share.cgi: ‎The‏ ‎vulnerability ‎arises‏ ‎from ‎the ‎unsafe ‎use ‎of‏ ‎the‏ ‎strcpy‏ ‎function ‎in‏ ‎the ‎No_Support_ACL‏ ‎function, ‎which‏ ‎is‏ ‎accessible ‎via‏ ‎the ‎get_file_size ‎function ‎in ‎share.cgi.‏ ‎This ‎leads‏ ‎to‏ ‎a ‎stack ‎buffer‏ ‎overflow, ‎which‏ ‎can ‎be ‎exploited ‎to‏ ‎achieve‏ ‎Remote ‎Code‏ ‎Execution ‎(RCE).


Attack‏ ‎Scenario:

📌Step ‎1: ‎Initial ‎Access: ‎An‏ ‎attacker‏ ‎needs ‎a‏ ‎valid ‎NAS‏ ‎user ‎account ‎to ‎exploit ‎this‏ ‎vulnerability.‏ ‎This‏ ‎could ‎be‏ ‎achieved ‎through‏ ‎phishing, ‎credential‏ ‎stuffing,‏ ‎or ‎exploiting‏ ‎another ‎vulnerability ‎to ‎gain ‎initial‏ ‎access.

📌Step ‎2:‏ ‎File‏ ‎Sharing: ‎The ‎attacker‏ ‎shares ‎a‏ ‎file ‎with ‎an ‎untrusted‏ ‎user.‏ ‎This ‎action‏ ‎triggers ‎the‏ ‎get_file_size ‎function ‎in ‎share.cgi.

📌Step ‎3:‏ ‎Exploitation:‏ ‎The ‎get_file_size‏ ‎function ‎calls‏ ‎No_Support_ACL, ‎which ‎uses ‎strcpy ‎unsafely,‏ ‎leading‏ ‎to‏ ‎a ‎stack‏ ‎buffer ‎overflow.‏ ‎The ‎attacker‏ ‎crafts‏ ‎a ‎payload‏ ‎that ‎overflows ‎the ‎buffer ‎and‏ ‎injects ‎malicious‏ ‎code.

📌Step‏ ‎4: ‎Remote ‎Code‏ ‎Execution: ‎The‏ ‎overflowed ‎buffer ‎allows ‎the‏ ‎attacker‏ ‎to ‎execute‏ ‎arbitrary ‎code‏ ‎on ‎the ‎NAS ‎device, ‎potentially‏ ‎gaining‏ ‎full ‎control‏ ‎over ‎the‏ ‎system.


Related ‎Vulnerabilities

📌CVE-2024-27129: Unsafe ‎use ‎of ‎strcpy‏ ‎in‏ ‎the‏ ‎get_tree ‎function‏ ‎of ‎utilRequest.cgi‏ ‎leading ‎to‏ ‎a‏ ‎static ‎buffer‏ ‎overflow ‎and ‎RCE ‎with ‎a‏ ‎requirement ‎of‏ ‎a‏ ‎valid ‎account ‎on‏ ‎the ‎NAS‏ ‎device.

📌CVE-2024-27131: Log ‎spoofing ‎via ‎x-forwarded-for‏ ‎allows‏ ‎users ‎to‏ ‎cause ‎downloads‏ ‎to ‎be ‎recorded ‎as ‎requested‏ ‎from‏ ‎an ‎arbitrary‏ ‎source ‎location‏ ‎with ‎a ‎requirement ‎of ‎the‏ ‎ability‏ ‎to‏ ‎download ‎a‏ ‎file.

📌WT-2024-0004: Stored ‎XSS‏ ‎via ‎remote‏ ‎syslog‏ ‎messages ‎with‏ ‎a ‎requirement ‎of ‎a ‎non-default‏ ‎configuration.

📌WT-2024-0005: Stored ‎XSS‏ ‎via‏ ‎remote ‎device ‎discovery‏ ‎with ‎no‏ ‎requirements

📌WT-2024-0006: Lack ‎of ‎rate-limiting ‎on‏ ‎the‏ ‎authentication ‎API‏ ‎with ‎no‏ ‎requirements


Mitigation ‎and ‎Patching

📌Patches ‎Available: The ‎first‏ ‎four‏ ‎vulnerabilities ‎(CVE-2024-27129,‏ ‎CVE-2024-27130, ‎CVE-2024-27131,‏ ‎and ‎WT-2024-0004) ‎have ‎been ‎patched‏ ‎in‏ ‎the‏ ‎following ‎versions:‏ ‎QTS ‎5.1.6.2722‏ ‎build ‎20240402‏ ‎and‏ ‎later, ‎QuTS‏ ‎hero ‎h5.1.6.2734 ‎build ‎20240414 ‎and‏ ‎later

📌Vendor ‎Response:‏ ‎The‏ ‎vendor ‎has ‎acknowledged‏ ‎the ‎vulnerabilities‏ ‎and ‎has ‎been ‎working‏ ‎on‏ ‎fixes, ‎although‏ ‎some ‎issues‏ ‎remain ‎under ‎extended ‎embargo ‎due‏ ‎to‏ ‎their ‎complexity.


Читать: 12+ мин
logo Overkill Security

MalPurifier. Detoxifying Your Android, One Malicious Byte at a Time

Another ‎document‏ ‎to ‎analyze. ‎This ‎time, ‎it’s‏ ‎the ‎riveting‏ ‎«MalPurifier:‏ ‎Enhancing ‎Android ‎Malware‏ ‎Detection ‎with‏ ‎Adversarial ‎Purification ‎against ‎Evasion‏ ‎Attacks.»‏ ‎Because, ‎you‏ ‎know, ‎the‏ ‎world ‎really ‎needed ‎another ‎paper‏ ‎on‏ ‎Android ‎malware‏ ‎detection.

First, ‎we’ll‏ ‎dive ‎into ‎the ‎Introduction ‎and‏ ‎Motivation‏ ‎to‏ ‎understand ‎why‏ ‎yet ‎another‏ ‎solution ‎to‏ ‎the‏ ‎ever-escalating ‎threats‏ ‎of ‎Android ‎malware ‎is ‎necessary.‏ ‎Spoiler ‎alert:‏ ‎it’s‏ ‎because ‎current ‎machine‏ ‎learning-based ‎approaches‏ ‎are ‎as ‎vulnerable ‎as‏ ‎a‏ ‎house ‎of‏ ‎cards ‎in‏ ‎a ‎windstorm.

We’ll ‎then ‎move ‎on‏ ‎to‏ ‎the ‎Experimental‏ ‎Setup ‎and‏ ‎Results. ‎This ‎section ‎will ‎reveal‏ ‎how‏ ‎MalPurifier‏ ‎outperforms ‎other‏ ‎defenses, ‎achieving‏ ‎over ‎90,91%‏ ‎accuracy.‏ ‎Impressive, ‎if‏ ‎you ‎ignore ‎the ‎fact ‎that‏ ‎it’s ‎tested‏ ‎on‏ ‎datasets ‎that ‎may‏ ‎or ‎may‏ ‎not ‎reflect ‎real-world ‎scenarios.

The‏ ‎Defense‏ ‎Mechanisms ‎section‏ ‎will ‎discuss‏ ‎the ‎various ‎strategies ‎employed ‎by‏ ‎MalPurifier,‏ ‎such ‎as‏ ‎adversarial ‎purification‏ ‎and ‎adversarial ‎training. ‎Because ‎nothing‏ ‎says‏ ‎«robust‏ ‎defense» ‎like‏ ‎throwing ‎more‏ ‎adversarial ‎examples‏ ‎at‏ ‎the ‎problem.

Of‏ ‎course, ‎no ‎paper ‎is ‎complete‏ ‎without ‎acknowledging‏ ‎its‏ ‎Limitations ‎and ‎Future‏ ‎Work. ‎Here,‏ ‎the ‎authors ‎will ‎humbly‏ ‎admit‏ ‎that ‎their‏ ‎solution ‎isn’t‏ ‎perfect ‎and ‎suggest ‎areas ‎for‏ ‎future‏ ‎research. ‎Because,‏ ‎naturally, ‎the‏ ‎quest ‎for ‎the ‎perfect ‎malware‏ ‎detection‏ ‎system‏ ‎is ‎never-ending.

This‏ ‎analysis ‎will‏ ‎provide ‎a‏ ‎high-quality‏ ‎summary ‎of‏ ‎the ‎document, ‎highlighting ‎its ‎contributions‏ ‎and ‎implications‏ ‎for‏ ‎security ‎professionals ‎and‏ ‎other ‎specialists‏ ‎in ‎various ‎fields. ‎It‏ ‎will‏ ‎be ‎particularly‏ ‎useful ‎for‏ ‎those ‎who ‎enjoy ‎reading ‎about‏ ‎the‏ ‎latest ‎and‏ ‎greatest ‎in‏ ‎malware ‎detection, ‎even ‎if ‎the‏ ‎practical‏ ‎applications‏ ‎are ‎still‏ ‎up ‎for‏ ‎debate.

----

This ‎document‏ ‎provides‏ ‎a ‎comprehensive‏ ‎analysis ‎of ‎the ‎paper ‎titled‏ ‎«MalPurifier: ‎Enhancing‏ ‎Android‏ ‎Malware ‎Detection ‎with‏ ‎Adversarial ‎Purification‏ ‎against ‎Evasion ‎Attacks.» ‎The‏ ‎analysis‏ ‎delves ‎into‏ ‎various ‎aspects‏ ‎of ‎the ‎paper, ‎including ‎the‏ ‎motivation‏ ‎behind ‎the‏ ‎research, ‎the‏ ‎methodology ‎employed, ‎the ‎experimental ‎setup,‏ ‎and‏ ‎the‏ ‎results ‎obtained.

This‏ ‎analysis ‎provides‏ ‎a ‎high-quality‏ ‎summary‏ ‎of ‎the‏ ‎document, ‎offering ‎valuable ‎insights ‎for‏ ‎security ‎professionals,‏ ‎researchers,‏ ‎and ‎practitioners ‎in‏ ‎various ‎fields.‏ ‎By ‎understanding ‎the ‎strengths‏ ‎and‏ ‎limitations ‎of‏ ‎the ‎MalPurifier‏ ‎framework, ‎stakeholders ‎can ‎better ‎appreciate‏ ‎its‏ ‎potential ‎applications‏ ‎and ‎contributions‏ ‎to ‎enhancing ‎Android ‎malware ‎detection‏ ‎systems.‏ ‎The‏ ‎analysis ‎is‏ ‎useful ‎for‏ ‎those ‎involved‏ ‎in‏ ‎cybersecurity, ‎machine‏ ‎learning, ‎and ‎mobile ‎application ‎security,‏ ‎as ‎it‏ ‎highlights‏ ‎innovative ‎approaches ‎to‏ ‎mitigating ‎the‏ ‎risks ‎posed ‎by ‎adversarial‏ ‎evasion‏ ‎attacks.

The ‎paper‏ ‎titled ‎«MalPurifier:‏ ‎Enhancing ‎Android ‎Malware ‎Detection ‎with‏ ‎Adversarial‏ ‎Purification ‎against‏ ‎Evasion ‎Attacks»‏ ‎presents ‎a ‎novel ‎approach ‎to‏ ‎improving‏ ‎the‏ ‎detection ‎of‏ ‎Android ‎malware,‏ ‎particularly ‎in‏ ‎the‏ ‎face ‎of‏ ‎adversarial ‎evasion ‎attacks. ‎The ‎paper‏ ‎highlights ‎that‏ ‎this‏ ‎is ‎the ‎first‏ ‎attempt ‎to‏ ‎use ‎adversarial ‎purification ‎to‏ ‎mitigate‏ ‎evasion ‎attacks‏ ‎in ‎the‏ ‎Android ‎ecosystem, ‎providing ‎a ‎promising‏ ‎solution‏ ‎to ‎enhance‏ ‎the ‎security‏ ‎of ‎Android ‎malware ‎detection ‎systems.

Motivation:

📌 Prevalence‏ ‎of‏ ‎Android‏ ‎Malware: The ‎paper‏ ‎highlights ‎the‏ ‎widespread ‎issue‏ ‎of‏ ‎Android ‎malware,‏ ‎which ‎poses ‎significant ‎security ‎threats‏ ‎to ‎users‏ ‎and‏ ‎devices.

📌 Evasion ‎Techniques: Attackers ‎often‏ ‎use ‎evasion‏ ‎techniques ‎to ‎modify ‎malware,‏ ‎making‏ ‎it ‎difficult‏ ‎for ‎traditional‏ ‎detection ‎systems ‎to ‎identify ‎them.

Challenges:

📌 Adversarial‏ ‎Attacks:‏ ‎it ‎discusses‏ ‎the ‎challenge‏ ‎posed ‎by ‎adversarial ‎attacks, ‎where‏ ‎small‏ ‎perturbations‏ ‎are ‎added‏ ‎to ‎malware‏ ‎samples ‎to‏ ‎evade‏ ‎detection.

📌 Detection ‎System‏ ‎Vulnerabilities: Existing ‎malware ‎detection ‎systems ‎are‏ ‎vulnerable ‎to‏ ‎these‏ ‎adversarial ‎attacks, ‎leading‏ ‎to ‎a‏ ‎need ‎for ‎more ‎robust‏ ‎solutions.

Objective‏ ‎and ‎proposed‏ ‎Solution:

📌 Enhancing ‎Detection‏ ‎Robustness: The ‎primary ‎objective ‎of ‎the‏ ‎research‏ ‎is ‎to‏ ‎enhance ‎the‏ ‎robustness ‎of ‎Android ‎malware ‎detection‏ ‎systems‏ ‎against‏ ‎adversarial ‎evasion‏ ‎attacks.

📌 Adversarial ‎Purification: The‏ ‎proposed ‎solution,‏ ‎MalPurifier,‏ ‎aims ‎to‏ ‎purify ‎adversarial ‎examples, ‎removing ‎the‏ ‎perturbations ‎and‏ ‎restoring‏ ‎the ‎malware ‎to‏ ‎a ‎detectable‏ ‎form.

📌 Techniques ‎Used: The ‎system ‎employs‏ ‎techniques‏ ‎such ‎as‏ ‎autoencoders ‎and‏ ‎generative ‎adversarial ‎networks ‎(GANs) ‎for‏ ‎the‏ ‎purification ‎process.

Techniques‏ ‎Used ‎in‏ ‎Evasion ‎Attacks:

📌 Adversarial ‎Examples: Attackers ‎create ‎adversarial‏ ‎examples‏ ‎by‏ ‎adding ‎small‏ ‎perturbations ‎to‏ ‎malware ‎samples.‏ ‎These‏ ‎perturbations ‎are‏ ‎designed ‎to ‎exploit ‎vulnerabilities ‎in‏ ‎the ‎detection‏ ‎model’s‏ ‎decision ‎boundaries.

📌 Obfuscation: Techniques ‎such‏ ‎as ‎code‏ ‎encryption, ‎packing, ‎and ‎polymorphism‏ ‎are‏ ‎used ‎to‏ ‎alter ‎the‏ ‎appearance ‎of ‎the ‎malware ‎without‏ ‎changing‏ ‎its ‎functionality.

📌 Feature‏ ‎Manipulation: ‎Modifying‏ ‎features ‎used ‎by ‎the ‎detection‏ ‎model,‏ ‎such‏ ‎as ‎adding‏ ‎benign ‎features‏ ‎or ‎obfuscating‏ ‎malicious‏ ‎ones, ‎to‏ ‎evade ‎detection.

Significance:

📌 Improved ‎Security: ‎By ‎enhancing‏ ‎the ‎detection‏ ‎capabilities‏ ‎of ‎malware ‎detection‏ ‎systems, ‎MalPurifier‏ ‎aims ‎to ‎provide ‎better‏ ‎security‏ ‎for ‎Android‏ ‎devices.

📌 Research ‎Contribution:‏ ‎The ‎paper ‎contributes ‎to ‎the‏ ‎field‏ ‎by ‎addressing‏ ‎the ‎gap‏ ‎in ‎robust ‎malware ‎detection ‎solutions‏ ‎that‏ ‎can‏ ‎withstand ‎adversarial‏ ‎attacks.

Benefits

📌 High ‎Accuracy: MalPurifier‏ ‎demonstrates ‎high‏ ‎effectiveness,‏ ‎achieving ‎accuracies‏ ‎over ‎90,91% ‎against ‎37 ‎different‏ ‎evasion ‎attacks.‏ ‎This‏ ‎indicates ‎a ‎robust‏ ‎performance ‎in‏ ‎detecting ‎adversarially ‎perturbed ‎malware‏ ‎samples.

📌 Scalability:‏ ‎The ‎method‏ ‎is ‎easily‏ ‎scalable ‎to ‎different ‎detection ‎models,‏ ‎offering‏ ‎flexibility ‎and‏ ‎robustness ‎in‏ ‎its ‎implementation ‎without ‎requiring ‎significant‏ ‎modifications.

📌 Lightweight‏ ‎and‏ ‎Flexible: ‎The‏ ‎use ‎of‏ ‎a ‎plug-and-play‏ ‎Denoising‏ ‎AutoEncoder ‎(DAE)‏ ‎model ‎allows ‎for ‎a ‎lightweight‏ ‎and ‎flexible‏ ‎approach‏ ‎to ‎purifying ‎adversarial‏ ‎malware. ‎This‏ ‎ensures ‎that ‎the ‎method‏ ‎can‏ ‎be ‎integrated‏ ‎into ‎existing‏ ‎systems ‎with ‎minimal ‎overhead.

📌 Comprehensive ‎Defense:‏ ‎By‏ ‎focusing ‎on‏ ‎adversarial ‎purification,‏ ‎MalPurifier ‎addresses ‎a ‎critical ‎vulnerability‏ ‎in‏ ‎ML-based‏ ‎malware ‎detection‏ ‎systems, ‎enhancing‏ ‎their ‎overall‏ ‎security‏ ‎and ‎robustness‏ ‎against ‎sophisticated ‎evasion ‎techniques.

Limitations

📌 Generalization ‎to‏ ‎Other ‎Platforms: The‏ ‎current‏ ‎implementation ‎and ‎evaluation‏ ‎are ‎focused‏ ‎solely ‎on ‎the ‎Android‏ ‎ecosystem.‏ ‎The ‎effectiveness‏ ‎of ‎MalPurifier‏ ‎on ‎other ‎platforms, ‎such ‎as‏ ‎iOS‏ ‎or ‎Windows,‏ ‎remains ‎untested‏ ‎and ‎uncertain.

📌 Scalability ‎Concerns: While ‎the ‎paper‏ ‎claims‏ ‎scalability,‏ ‎the ‎actual‏ ‎performance ‎and‏ ‎efficiency ‎of‏ ‎MalPurifier‏ ‎in ‎large-scale,‏ ‎real-time ‎detection ‎scenarios ‎have ‎not‏ ‎been ‎thoroughly‏ ‎evaluated.‏ ‎This ‎raises ‎questions‏ ‎about ‎its‏ ‎practical ‎applicability ‎in ‎high-volume‏ ‎environments.

📌 Computational‏ ‎Overhead: ‎The‏ ‎purification ‎process‏ ‎introduces ‎additional ‎computational ‎overhead. ‎Although‏ ‎described‏ ‎as ‎lightweight,‏ ‎the ‎impact‏ ‎on ‎system ‎performance, ‎especially ‎in‏ ‎resource-constrained‏ ‎environments,‏ ‎needs ‎further‏ ‎investigation.

📌 Adversarial ‎Adaptation: Attackers‏ ‎may ‎develop‏ ‎new‏ ‎strategies ‎to‏ ‎adapt ‎to ‎the ‎purification ‎process,‏ ‎potentially ‎circumventing‏ ‎the‏ ‎defenses ‎provided ‎by‏ ‎MalPurifier. ‎Continuous‏ ‎adaptation ‎and ‎improvement ‎of‏ ‎the‏ ‎purification ‎techniques‏ ‎are ‎necessary‏ ‎to ‎stay ‎ahead ‎of ‎evolving‏ ‎threats.

📌 Evaluation‏ ‎Metrics: ‎The‏ ‎evaluation ‎primarily‏ ‎focuses ‎on ‎detection ‎accuracy ‎and‏ ‎robustness‏ ‎against‏ ‎evasion ‎attacks.‏ ‎Other ‎important‏ ‎metrics, ‎such‏ ‎as‏ ‎energy ‎consumption,‏ ‎user ‎experience, ‎and ‎long-term ‎efficacy,‏ ‎are ‎not‏ ‎addressed,‏ ‎limiting ‎the ‎comprehensiveness‏ ‎of ‎the‏ ‎assessment.

📌 Integration ‎with ‎Existing ‎Systems: The‏ ‎paper‏ ‎does ‎not‏ ‎extensively ‎discuss‏ ‎the ‎integration ‎of ‎MalPurifier ‎with‏ ‎existing‏ ‎malware ‎detection‏ ‎systems ‎and‏ ‎the ‎potential ‎impact ‎on ‎their‏ ‎performance.‏ ‎Seamless‏ ‎integration ‎strategies‏ ‎and ‎combined‏ ‎performance ‎evaluations‏ ‎are‏ ‎needed

Impact ‎on‏ ‎Technology

📌 Advancement ‎in ‎Malware ‎Detection: MalPurifier ‎represents‏ ‎a ‎significant‏ ‎technological‏ ‎advancement ‎in ‎the‏ ‎field ‎of‏ ‎malware ‎detection. ‎By ‎leveraging‏ ‎adversarial‏ ‎purification ‎techniques,‏ ‎it ‎enhances‏ ‎the ‎robustness ‎of ‎Android ‎malware‏ ‎detection‏ ‎systems ‎against‏ ‎evasion ‎attacks.‏ ‎This ‎innovation ‎can ‎lead ‎to‏ ‎the‏ ‎development‏ ‎of ‎more‏ ‎secure ‎and‏ ‎reliable ‎malware‏ ‎detection‏ ‎tools.

📌 Adversarial ‎Defense‏ ‎Mechanisms: ‎The ‎paper ‎contributes ‎to‏ ‎the ‎broader‏ ‎field‏ ‎of ‎adversarial ‎machine‏ ‎learning ‎by‏ ‎demonstrating ‎the ‎effectiveness ‎of‏ ‎adversarial‏ ‎purification. ‎This‏ ‎technique ‎can‏ ‎be ‎adapted ‎and ‎applied ‎to‏ ‎other‏ ‎areas ‎of‏ ‎cybersecurity, ‎such‏ ‎as ‎network ‎intrusion ‎detection ‎and‏ ‎endpoint‏ ‎security,‏ ‎thereby ‎improving‏ ‎the ‎overall‏ ‎resilience ‎of‏ ‎these‏ ‎systems ‎against‏ ‎sophisticated ‎attacks.

📌 Machine ‎Learning ‎Applications: The ‎use‏ ‎of ‎Denoising‏ ‎AutoEncoders‏ ‎(DAEs) ‎and ‎Generative‏ ‎Adversarial ‎Networks‏ ‎(GANs) ‎in ‎MalPurifier ‎showcases‏ ‎the‏ ‎potential ‎of‏ ‎advanced ‎machine‏ ‎learning ‎models ‎in ‎cybersecurity ‎applications.‏ ‎This‏ ‎can ‎inspire‏ ‎further ‎research‏ ‎and ‎development ‎in ‎applying ‎these‏ ‎models‏ ‎to‏ ‎other ‎security‏ ‎challenges, ‎such‏ ‎as ‎phishing‏ ‎detection‏ ‎and ‎fraud‏ ‎prevention.

Impact ‎on ‎Industry

📌 Enhanced ‎Security ‎for‏ ‎Mobile ‎Devices: Industries‏ ‎that‏ ‎rely ‎heavily ‎on‏ ‎mobile ‎devices,‏ ‎such ‎as ‎healthcare, ‎finance,‏ ‎and‏ ‎retail, ‎can‏ ‎benefit ‎from‏ ‎the ‎enhanced ‎security ‎provided ‎by‏ ‎MalPurifier.‏ ‎By ‎improving‏ ‎the ‎detection‏ ‎of ‎Android ‎malware, ‎these ‎industries‏ ‎can‏ ‎better‏ ‎protect ‎sensitive‏ ‎data ‎and‏ ‎maintain ‎the‏ ‎integrity‏ ‎of ‎their‏ ‎mobile ‎applications.

📌 Reduction ‎in ‎Cybersecurity ‎Incidents: The‏ ‎implementation ‎of‏ ‎robust‏ ‎malware ‎detection ‎systems‏ ‎like ‎MalPurifier‏ ‎can ‎lead ‎to ‎a‏ ‎reduction‏ ‎in ‎cybersecurity‏ ‎incidents, ‎such‏ ‎as ‎data ‎breaches ‎and ‎ransomware‏ ‎attacks.‏ ‎This ‎can‏ ‎result ‎in‏ ‎significant ‎cost ‎savings ‎for ‎businesses‏ ‎and‏ ‎reduce‏ ‎the ‎potential‏ ‎for ‎reputational‏ ‎damage.

📌 Compliance ‎and‏ ‎Regulatory‏ ‎Benefits: Enhanced ‎malware‏ ‎detection ‎capabilities ‎can ‎help ‎organizations‏ ‎comply ‎with‏ ‎regulatory‏ ‎requirements ‎related ‎to‏ ‎data ‎protection‏ ‎and ‎cybersecurity. ‎For ‎example,‏ ‎industries‏ ‎subject ‎to‏ ‎regulations ‎like‏ ‎GDPR ‎or ‎HIPAA ‎can ‎leverage‏ ‎MalPurifier‏ ‎to ‎ensure‏ ‎they ‎meet‏ ‎stringent ‎security ‎standards.

📌 Innovation ‎in ‎Cybersecurity‏ ‎Products: Cybersecurity‏ ‎companies‏ ‎can ‎incorporate‏ ‎the ‎techniques‏ ‎presented ‎in‏ ‎the‏ ‎paper ‎into‏ ‎their ‎products, ‎leading ‎to ‎the‏ ‎development ‎of‏ ‎next-generation‏ ‎security ‎solutions. ‎This‏ ‎can ‎provide‏ ‎a ‎competitive ‎edge ‎in‏ ‎the‏ ‎market ‎and‏ ‎drive ‎innovation‏ ‎in ‎the ‎cybersecurity ‎industry.

📌 Cross-Industry ‎Applications:‏ ‎While‏ ‎the ‎paper‏ ‎focuses ‎on‏ ‎Android ‎malware ‎detection, ‎the ‎underlying‏ ‎principles‏ ‎of‏ ‎adversarial ‎purification‏ ‎can ‎be‏ ‎applied ‎across‏ ‎various‏ ‎industries. ‎Sectors‏ ‎such ‎as ‎manufacturing, ‎public ‎administration,‏ ‎and ‎transportation,‏ ‎which‏ ‎are ‎also ‎affected‏ ‎by ‎malware,‏ ‎can ‎adapt ‎these ‎techniques‏ ‎to‏ ‎enhance ‎their‏ ‎cybersecurity ‎measures.



Читать: 2+ мин
logo Overkill Security

Root Privileges for Dummies: Just Exploit CVE-2024-3400

CVE-2024-3400 (+ url + github ‎url#1, url#2) is‏ ‎a ‎critical ‎command ‎injection ‎vulnerability‏ ‎in ‎Palo‏ ‎Alto‏ ‎Networks' ‎PAN-OS ‎software,‏ ‎specifically ‎affecting‏ ‎the ‎GlobalProtect ‎feature. ‎This‏ ‎vulnerability‏ ‎allows ‎an‏ ‎unauthenticated, ‎remote‏ ‎attacker ‎to ‎execute ‎arbitrary ‎code‏ ‎with‏ ‎root ‎privileges‏ ‎on ‎the‏ ‎affected ‎firewall. ‎The ‎vulnerability ‎impacts‏ ‎PAN-OS‏ ‎versions‏ ‎10.2, ‎11.0,‏ ‎and ‎11.1‏ ‎when ‎configured‏ ‎with‏ ‎GlobalProtect ‎gateway‏ ‎or ‎GlobalProtect ‎portal.

Initial ‎Discovery ‎and‏ ‎Exploitation:

📌The ‎vulnerability‏ ‎was‏ ‎first ‎identified ‎by‏ ‎Volexity, ‎who‏ ‎observed ‎zero-day ‎exploitation ‎attempts‏ ‎on‏ ‎March ‎26,‏ ‎2024.

📌Attackers, ‎identified‏ ‎as ‎the ‎state-backed ‎group ‎UTA0218,‏ ‎exploited‏ ‎the ‎vulnerability‏ ‎to ‎gain‏ ‎unauthorized ‎access ‎to ‎firewall ‎devices.

Attack‏ ‎Vector:

📌The‏ ‎vulnerability‏ ‎is ‎exploited‏ ‎via ‎a‏ ‎command ‎injection‏ ‎flaw‏ ‎in ‎the‏ ‎GlobalProtect ‎feature. ‎Attackers ‎can ‎manipulate‏ ‎the ‎SESSID‏ ‎cookie‏ ‎to ‎create ‎arbitrary‏ ‎files ‎on‏ ‎the ‎system, ‎which ‎can‏ ‎then‏ ‎be ‎used‏ ‎to ‎execute‏ ‎commands ‎with ‎root ‎privileges.

📌The ‎attack‏ ‎does‏ ‎not ‎require‏ ‎authentication, ‎making‏ ‎it ‎highly ‎dangerous ‎and ‎easily‏ ‎exploitable.


Exploitation‏ ‎Flow:

Step‏ ‎1: ‎Reconnaissance:

📌Attackers‏ ‎scan ‎for‏ ‎vulnerable ‎PAN-OS‏ ‎devices‏ ‎configured ‎with‏ ‎GlobalProtect ‎gateway ‎or ‎portal.

📌They ‎use‏ ‎simple ‎commands‏ ‎to‏ ‎place ‎zero-byte ‎files‏ ‎on ‎the‏ ‎system ‎to ‎validate ‎the‏ ‎vulnerability.

Step‏ ‎2: ‎Initial‏ ‎Exploitation:

📌Attackers ‎send‏ ‎specially ‎crafted ‎network ‎requests ‎to‏ ‎the‏ ‎vulnerable ‎device,‏ ‎manipulating ‎the‏ ‎SESSID ‎cookie ‎to ‎create ‎a‏ ‎file‏ ‎in‏ ‎a ‎specific‏ ‎directory.

📌Example: ‎Cookie:‏ ‎SESSID=/./././var/appweb/sslvpndocs/global-protect/portal/images/poc.txt.

Step ‎3:‏ ‎Command‏ ‎Execution:

📌The ‎created‏ ‎file ‎is ‎used ‎to ‎inject‏ ‎and ‎execute‏ ‎arbitrary‏ ‎commands ‎with ‎root‏ ‎privileges.

📌Attackers ‎establish‏ ‎a ‎reverse ‎shell ‎and‏ ‎install‏ ‎additional ‎tools,‏ ‎such ‎as‏ ‎a ‎custom ‎Python ‎backdoor ‎named‏ ‎UPSTYLE,‏ ‎to ‎maintain‏ ‎persistent ‎access.

Step‏ ‎4: ‎Post-Exploitation:

📌Attackers ‎exfiltrate ‎sensitive ‎data,‏ ‎including‏ ‎the‏ ‎firewall’s ‎running‏ ‎configuration ‎and‏ ‎credentials.

📌They ‎may‏ ‎also‏ ‎use ‎the‏ ‎compromised ‎device ‎to ‎move ‎laterally‏ ‎within ‎the‏ ‎network,‏ ‎targeting ‎other ‎systems.


Observed‏ ‎Malicious ‎Activity:

📌An‏ ‎uptick ‎in ‎malicious ‎activity‏ ‎was‏ ‎observed ‎soon‏ ‎after ‎the‏ ‎public ‎disclosure ‎of ‎the ‎vulnerability‏ ‎and‏ ‎the ‎release‏ ‎of ‎an‏ ‎exploit ‎script ‎on ‎GitHub.

📌Attackers ‎used‏ ‎the‏ ‎UPSTYLE‏ ‎backdoor ‎to‏ ‎interact ‎with‏ ‎the ‎compromised‏ ‎device‏ ‎indirectly, ‎sending‏ ‎commands ‎via ‎error ‎logs ‎and‏ ‎receiving ‎output‏ ‎through‏ ‎a ‎publicly ‎accessible‏ ‎stylesheet.


Читать: 5+ мин
logo Overkill Security

When Velociraptors Meet VMs. A Forensic Fairytale

Читать: 4+ мин
logo Overkill Security

When Velociraptors Meet VMs. A Forensic Fairytale [announcement]

Welcome ‎to‏ ‎the ‎riveting ‎world ‎of ‎forensic‏ ‎analysis ‎on‏ ‎VMware‏ ‎ESXi ‎environments ‎using‏ ‎Velociraptor, ‎the‏ ‎tool ‎that ‎promises ‎to‏ ‎make‏ ‎your ‎life‏ ‎just ‎a‏ ‎tad ‎bit ‎easier.

Velociraptor, ‎with ‎its‏ ‎advanced‏ ‎forensic ‎techniques,‏ ‎is ‎tailored‏ ‎to ‎the ‎complexities ‎of ‎virtualized‏ ‎server‏ ‎infrastructures.‏ ‎It’s ‎like‏ ‎having ‎a‏ ‎Swiss ‎Army‏ ‎knife‏ ‎for ‎your‏ ‎forensic ‎needs, ‎minus ‎the ‎actual‏ ‎knife. ‎Whether‏ ‎you’re‏ ‎dealing ‎with ‎data‏ ‎extraction, ‎log‏ ‎analysis, ‎or ‎identifying ‎malicious‏ ‎activities,‏ ‎Velociraptor ‎has‏ ‎got ‎you‏ ‎covered.

But ‎let’s ‎not ‎kid ‎ourselves—this‏ ‎is‏ ‎serious ‎business.‏ ‎The ‎integrity‏ ‎and ‎security ‎of ‎virtualized ‎environments‏ ‎are‏ ‎paramount,‏ ‎and ‎the‏ ‎ability ‎to‏ ‎conduct ‎thorough‏ ‎forensic‏ ‎investigations ‎is‏ ‎critical. ‎So, ‎while ‎we ‎might‏ ‎enjoy ‎a‏ ‎bit‏ ‎of ‎snark ‎and‏ ‎irony, ‎the‏ ‎importance ‎of ‎this ‎work‏ ‎cannot‏ ‎be ‎overstated.‏ ‎Security ‎professionals,‏ ‎IT ‎forensic ‎analysts, ‎and ‎other‏ ‎specialists‏ ‎rely ‎on‏ ‎these ‎methodologies‏ ‎to ‎protect ‎and ‎secure ‎their‏ ‎infrastructures.‏ ‎And‏ ‎that, ‎dear‏ ‎reader, ‎is‏ ‎no ‎laughing‏ ‎matter.

Read‏ ‎the ‎article/PDF

----

This‏ ‎document ‎provides ‎a ‎comprehensive ‎analysis‏ ‎of ‎forensics‏ ‎using‏ ‎the ‎Velociraptor ‎tool.‏ ‎The ‎analysis‏ ‎delves ‎into ‎various ‎aspects‏ ‎of‏ ‎forensic ‎investigations‏ ‎specific ‎environments,‏ ‎which ‎are ‎maintaining ‎the ‎integrity‏ ‎and‏ ‎security ‎of‏ ‎virtualized ‎server‏ ‎infrastructures. ‎Key ‎aspects ‎covered ‎include‏ ‎data‏ ‎extraction‏ ‎methodologies, ‎log‏ ‎analysis, ‎and‏ ‎the ‎identification‏ ‎of‏ ‎malicious ‎activities‏ ‎within ‎the ‎virtual ‎machines ‎hosted‏ ‎on ‎ESXi‏ ‎servers.

This‏ ‎analysis ‎is ‎particularly‏ ‎beneficial ‎for‏ ‎security ‎professionals, ‎IT ‎forensic‏ ‎analysts,‏ ‎and ‎other‏ ‎specialists ‎across‏ ‎different ‎industries ‎who ‎are ‎tasked‏ ‎with‏ ‎the ‎investigation‏ ‎and ‎mitigation‏ ‎of ‎security ‎breaches ‎in ‎virtualized‏ ‎environments.


This‏ ‎document‏ ‎discusses ‎the‏ ‎application ‎of‏ ‎Velociraptor, ‎a‏ ‎forensic‏ ‎and ‎incident‏ ‎response ‎tool, ‎for ‎conducting ‎forensic‏ ‎analysis ‎on‏ ‎VMware‏ ‎ESXi ‎environments. ‎The‏ ‎use ‎of‏ ‎Velociraptor ‎in ‎this ‎context‏ ‎suggests‏ ‎a ‎focus‏ ‎on ‎advanced‏ ‎forensic ‎techniques ‎tailored ‎to ‎the‏ ‎complexities‏ ‎of ‎virtualized‏ ‎server ‎infrastructures

Key‏ ‎Aspects ‎of ‎the ‎Analysis

📌 Data ‎Extraction‏ ‎Methodologies:‏ ‎it‏ ‎discusses ‎methods‏ ‎for ‎extracting‏ ‎data ‎from‏ ‎ESXi‏ ‎systems, ‎which‏ ‎is ‎vital ‎for ‎forensic ‎investigations‏ ‎following ‎security‏ ‎incidents.

📌 Log‏ ‎Analysis: ‎it ‎includes‏ ‎detailed ‎procedures‏ ‎for ‎examining ‎ESXi ‎logs,‏ ‎which‏ ‎can ‎reveal‏ ‎unauthorized ‎access‏ ‎or ‎other ‎malicious ‎activities.

📌 Identification ‎of‏ ‎Malicious‏ ‎Activities: ‎by‏ ‎analyzing ‎the‏ ‎artifacts ‎and ‎logs, ‎the ‎document‏ ‎outlines‏ ‎methods‏ ‎to ‎identify‏ ‎and ‎understand‏ ‎the ‎nature‏ ‎of‏ ‎malicious ‎activities‏ ‎that ‎may ‎have ‎occurred ‎within‏ ‎the ‎virtualized‏ ‎environment.

📌 Use‏ ‎of ‎Velociraptor ‎for‏ ‎Forensics: ‎it‏ ‎highlights ‎the ‎capabilities ‎of‏ ‎Velociraptor‏ ‎in ‎handling‏ ‎the ‎complexities‏ ‎associated ‎with ‎ESXi ‎systems, ‎making‏ ‎it‏ ‎a ‎valuable‏ ‎tool ‎for‏ ‎forensic ‎analysts.


Utility ‎of ‎the ‎Analysis

This‏ ‎forensic‏ ‎analysis‏ ‎is ‎immensely‏ ‎beneficial ‎for‏ ‎various ‎professionals‏ ‎in‏ ‎the ‎cybersecurity‏ ‎and ‎IT ‎fields:

📌 Security ‎Professionals: helps ‎in‏ ‎understanding ‎potential‏ ‎vulnerabilities‏ ‎and ‎points ‎of‏ ‎entry ‎for‏ ‎security ‎breaches ‎within ‎virtualized‏ ‎environments.

📌 Forensic‏ ‎Analysts: provides ‎methodologies‏ ‎and ‎tools‏ ‎necessary ‎for ‎conducting ‎thorough ‎investigations‏ ‎in‏ ‎environments ‎running‏ ‎VMware ‎ESXi.

📌 IT‏ ‎Administrators: ‎assists ‎in ‎the ‎proactive‏ ‎monitoring‏ ‎and‏ ‎securing ‎of‏ ‎virtualized ‎environments‏ ‎against ‎potential‏ ‎threats.

📌 Industries‏ ‎Using ‎VMware‏ ‎ESXi ‎offers ‎insights ‎into ‎securing‏ ‎and ‎managing‏ ‎virtualized‏ ‎environments, ‎which ‎is‏ ‎crucial ‎for‏ ‎maintaining ‎the ‎integrity ‎and‏ ‎security‏ ‎of ‎business‏ ‎operations.


VMWARE ‎ESXI:‏ ‎STRUCTURE ‎AND ‎ARTIFACTS

📌 Bare-Metal ‎Hypervisor: ‎VMware‏ ‎ESXi‏ ‎is ‎a‏ ‎bare-metal ‎hypervisor‏ ‎widely ‎used ‎for ‎virtualizing ‎information‏ ‎systems,‏ ‎often‏ ‎hosting ‎critical‏ ‎components ‎like‏ ‎application ‎servers‏ ‎and‏ ‎Active ‎Directory.

📌 Operating‏ ‎System: ‎It ‎operates ‎on ‎a‏ ‎custom ‎POSIX‏ ‎kernel‏ ‎called ‎VMkernel, ‎which‏ ‎utilizes ‎several‏ ‎utilities ‎through ‎BusyBox. ‎This‏ ‎results‏ ‎in ‎a‏ ‎UNIX-like ‎file‏ ‎system ‎organization ‎and ‎hierarchy.

📌 Forensic ‎Artifacts:‏ ‎From‏ ‎a ‎forensic‏ ‎perspective, ‎VMware‏ ‎ESXi ‎retains ‎typical ‎UNIX/Linux ‎system‏ ‎artifacts‏ ‎such‏ ‎as ‎command‏ ‎line ‎history.‏ ‎Additionally, ‎it‏ ‎includes‏ ‎artifacts ‎specific‏ ‎to ‎its ‎virtualization ‎features, ‎which‏ ‎are ‎crucial‏ ‎for‏ ‎forensic ‎investigations.



Читать: 1+ мин
logo Overkill Security

Breaking News: Chinese AVs Outwitted by Go Code

The ‎GitHub‏ ‎repository ‎«darkPulse» ‎by ‎user ‎«fdx-xdf» is‏ ‎a ‎shellcode‏ ‎packer‏ ‎written ‎in ‎Go.

📌Purpose: darkPulse‏ ‎is ‎designed‏ ‎to ‎generate ‎various ‎shellcode‏ ‎loaders‏ ‎that ‎can‏ ‎evade ‎detection‏ ‎by ‎Chinese ‎antivirus ‎software ‎such‏ ‎as‏ ‎Huorong ‎and‏ ‎360 ‎Total‏ ‎Security.

📌Shellcode ‎Loader ‎Generation: Generates ‎different ‎types‏ ‎of‏ ‎shellcode‏ ‎loaders.

📌Antivirus ‎Evasion: Focuses‏ ‎on ‎evading‏ ‎detection ‎by‏ ‎popular‏ ‎Chinese ‎antivirus‏ ‎programs ‎like ‎Huorong ‎and ‎360‏ ‎Total ‎Security.

📌Encryption‏ ‎and‏ ‎Obfuscation: Supports ‎AES ‎and‏ ‎XOR ‎encryption,‏ ‎and ‎UUID/words ‎obfuscation ‎to‏ ‎reduce‏ ‎entropy.

📌Loading ‎Techniques:‏ ‎Supports ‎multiple‏ ‎loading ‎techniques ‎including ‎callback, ‎fiber,‏ ‎and‏ ‎earlybird. ‎These‏ ‎can ‎be‏ ‎used ‎in ‎indirect ‎syscall ‎and‏ ‎unhook‏ ‎modes.

📌Encoding: Utilizes‏ ‎the ‎Shikata‏ ‎ga ‎nai‏ ‎encoder, ‎ported‏ ‎into‏ ‎Go ‎with‏ ‎several ‎improvements.

📌SysWhispers3: Uses ‎SysWhispers3 ‎for ‎indirect‏ ‎syscall ‎implementation.



Читать: 2+ мин
logo Overkill Security

AMSI Bypass: The Malware’s Express Lane

The GitHub ‎repository‏ ‎«V-i-x-x/AMSI-BYPASS» provides ‎information ‎about ‎a ‎vulnerability‏ ‎known ‎as‏ ‎«AMSI‏ ‎WRITE ‎RAID» ‎that‏ ‎can ‎be‏ ‎exploited ‎to ‎bypass ‎the‏ ‎Antimalware‏ ‎Scan ‎Interface‏ ‎(AMSI).

📌Vulnerability ‎Description: The‏ ‎«AMSI ‎WRITE ‎RAID» ‎vulnerability ‎allows‏ ‎attackers‏ ‎to ‎overwrite‏ ‎specific ‎writable‏ ‎entries ‎in ‎the ‎AMSI ‎call‏ ‎stack,‏ ‎effectively‏ ‎bypassing ‎AMSI’s‏ ‎protections.

📌Writable ‎Entries: The‏ ‎repository ‎highlights‏ ‎that‏ ‎multiple ‎entries‏ ‎in ‎the ‎AMSI ‎call ‎stack‏ ‎are ‎writable‏ ‎and‏ ‎can ‎be ‎targeted‏ ‎to ‎achieve‏ ‎the ‎bypass. ‎These ‎entries‏ ‎are‏ ‎detailed ‎in‏ ‎images ‎such‏ ‎as ‎«vulnerable_entries.png» ‎and ‎«writable_entries_part_1.png» ‎provided‏ ‎in‏ ‎the ‎repository.

📌Proof‏ ‎of ‎Concept: The‏ ‎repository ‎includes ‎a ‎PDF ‎document‏ ‎(Amsi.pdf)‏ ‎that‏ ‎elaborates ‎on‏ ‎the ‎vulnerability,‏ ‎providing ‎a‏ ‎comprehensive‏ ‎explanation ‎and‏ ‎proof ‎of ‎concept ‎for ‎how‏ ‎the ‎AMSI‏ ‎bypass‏ ‎can ‎be ‎executed.

📌Impact: Successfully‏ ‎exploiting ‎this‏ ‎vulnerability ‎allows ‎malicious ‎code‏ ‎to‏ ‎evade ‎detection‏ ‎by ‎AMSI,‏ ‎which ‎is ‎a ‎significant ‎security‏ ‎concern‏ ‎as ‎AMSI‏ ‎is ‎designed‏ ‎to ‎provide ‎an ‎additional ‎layer‏ ‎of‏ ‎defense‏ ‎against ‎malware.

Impact‏ ‎on ‎Industries

📌Increased‏ ‎Risk ‎of‏ ‎Malware‏ ‎Infections: AMSI ‎bypass‏ ‎techniques ‎allow ‎attackers ‎to ‎execute‏ ‎malicious ‎code‏ ‎undetected,‏ ‎increasing ‎the ‎risk‏ ‎of ‎malware‏ ‎infections, ‎including ‎ransomware ‎and‏ ‎fileless‏ ‎attacks. ‎This‏ ‎is ‎particularly‏ ‎concerning ‎for ‎industries ‎with ‎sensitive‏ ‎data,‏ ‎such ‎as‏ ‎finance, ‎healthcare,‏ ‎and ‎government ‎sectors.

📌Compromised ‎Security ‎Posture: Bypassing‏ ‎AMSI‏ ‎can‏ ‎lead ‎to‏ ‎a ‎compromised‏ ‎security ‎posture,‏ ‎as‏ ‎traditional ‎antivirus‏ ‎and ‎endpoint ‎detection ‎and ‎response‏ ‎(EDR) ‎solutions‏ ‎may‏ ‎fail ‎to ‎detect‏ ‎and ‎prevent‏ ‎malicious ‎activities. ‎This ‎can‏ ‎result‏ ‎in ‎data‏ ‎breaches, ‎financial‏ ‎losses, ‎and ‎damage ‎to ‎reputation.

📌Operational‏ ‎Disruptions: Successful‏ ‎AMSI ‎bypass‏ ‎attacks ‎can‏ ‎cause ‎significant ‎operational ‎disruptions, ‎especially‏ ‎in‏ ‎critical‏ ‎infrastructure ‎sectors‏ ‎like ‎energy,‏ ‎transportation, ‎and‏ ‎utilities.‏ ‎These ‎disruptions‏ ‎can ‎have ‎cascading ‎effects ‎on‏ ‎service ‎delivery‏ ‎and‏ ‎public ‎safety.


Читать: 1+ мин
logo Overkill Security

Digests'24

«If ‎laziness‏ ‎were ‎an ‎Olympic ‎sport, ‎I’d…‏ ‎ah, ‎nevermind,‏ ‎too‏ ‎much ‎effort. ‎Here‏ ‎are ‎all‏ ‎the ‎digests ‎so ‎you‏ ‎don’t‏ ‎have ‎to‏ ‎strain ‎yourself.»


The‏ ‎main ‎categories‏ ‎of ‎materials‏ ‎— ‎use ‎tags:


Also, ‎now ‎you‏ ‎can‏ ‎criticize‏ ‎everything ‎around‏ ‎you ‎with‏ ‎double ‎enthusiasm‏ ‎and‏ ‎for ‎half‏ ‎the ‎price. ‎Don’t ‎miss ‎the‏ ‎chance ‎to‏ ‎become‏ ‎a ‎professional ‎whiner‏ ‎at ‎a‏ ‎super ‎bargain ‎price! ‎Check‏ ‎out‏ ‎promo ‎level

📌Not‏ ‎sure ‎what‏ ‎level ‎is ‎suitable ‎for ‎you?‏ ‎Check‏ ‎this ‎explanation‏ ‎https://sponsr.ru/overkill_security/55291/Paid_Content/


Читать: 5+ мин
logo Overkill Security

Oops, We Did It Again. CVE-2024-21111 Strikes


This ‎document‏ ‎dives ‎into ‎the ‎thrilling ‎world‏ ‎of ‎CVE-2024-21111,‏ ‎a‏ ‎delightful ‎vulnerability ‎in‏ ‎Oracle ‎VM‏ ‎VirtualBox ‎that ‎just ‎loves‏ ‎to‏ ‎wreak ‎havoc‏ ‎on ‎Windows‏ ‎hosts. ‎We’ll ‎be ‎dissecting ‎this‏ ‎gem‏ ‎from ‎every‏ ‎possible ‎angle,‏ ‎because ‎who ‎doesn’t ‎love ‎a‏ ‎good‏ ‎security‏ ‎nightmare?

This ‎document‏ ‎provides ‎a‏ ‎top-notch ‎summary‏ ‎of‏ ‎the ‎vulnerability,‏ ‎offering ‎insights ‎for ‎security ‎professionals‏ ‎and ‎other‏ ‎stakeholders‏ ‎who ‎just ‎can’t‏ ‎get ‎enough‏ ‎of ‎dealing ‎with ‎these‏ ‎kinds‏ ‎of ‎issues.‏ ‎The ‎analysis‏ ‎is ‎a ‎must-read ‎for ‎anyone‏ ‎who‏ ‎enjoys ‎understanding‏ ‎the ‎risks‏ ‎associated ‎with ‎CVE-2024-21111 ‎and ‎implementing‏ ‎measures‏ ‎to‏ ‎prevent ‎their‏ ‎systems ‎from‏ ‎becoming ‎the‏ ‎next‏ ‎victim. ‎Enjoy!

----

This‏ ‎document ‎provides ‎a ‎comprehensive ‎analysis‏ ‎of ‎CVE-2024-21111,‏ ‎a‏ ‎critical ‎vulnerability ‎in‏ ‎Oracle ‎VM‏ ‎VirtualBox ‎affecting ‎Windows ‎hosts.‏ ‎The‏ ‎analysis ‎will‏ ‎cover ‎various‏ ‎aspects ‎of ‎the ‎vulnerability, ‎including‏ ‎its‏ ‎technical ‎details,‏ ‎exploitation ‎mechanisms,‏ ‎potential ‎impacts ‎on ‎different ‎industries.

This‏ ‎document‏ ‎provides‏ ‎a ‎high-quality‏ ‎summary ‎of‏ ‎the ‎vulnerability,‏ ‎offering‏ ‎valuable ‎insights‏ ‎for ‎security ‎professionals ‎and ‎other‏ ‎stakeholders ‎across‏ ‎various‏ ‎industries. ‎The ‎analysis‏ ‎is ‎beneficial‏ ‎for ‎understanding ‎the ‎risks‏ ‎associated‏ ‎with ‎CVE-2024-21111‏ ‎and ‎implementing‏ ‎effective ‎measures ‎to ‎safeguard ‎systems‏ ‎against‏ ‎potential ‎attacks.

CVE-2024-21111‏ ‎is ‎a‏ ‎significant ‎security ‎vulnerability ‎identified ‎in‏ ‎Oracle‏ ‎VM‏ ‎VirtualBox, ‎specifically‏ ‎affecting ‎Windows‏ ‎hosts. ‎This‏ ‎vulnerability‏ ‎is ‎present‏ ‎in ‎versions ‎of ‎VirtualBox ‎prior‏ ‎to ‎7.0.16.‏ ‎It‏ ‎allows ‎a ‎low‏ ‎privileged ‎attacker‏ ‎with ‎logon ‎access ‎to‏ ‎the‏ ‎infrastructure ‎where‏ ‎Oracle ‎VM‏ ‎VirtualBox ‎is ‎executed ‎to ‎potentially‏ ‎take‏ ‎over ‎the‏ ‎system

An ‎attacker‏ ‎exploiting ‎this ‎vulnerability ‎could ‎achieve‏ ‎unauthorized‏ ‎control‏ ‎over ‎the‏ ‎affected ‎Oracle‏ ‎VM ‎VirtualBox.‏ ‎The‏ ‎specific ‎technical‏ ‎mechanism ‎involves ‎local ‎privilege ‎escalation‏ ‎through ‎symbolic‏ ‎link‏ ‎following, ‎which ‎can‏ ‎lead ‎to‏ ‎arbitrary ‎file ‎deletion ‎and‏ ‎movement.


📌 Vulnerability‏ ‎Type: ‎Local‏ ‎Privilege ‎Escalation‏ ‎(LPE) ‎allows ‎a ‎low ‎privileged‏ ‎attacker‏ ‎who ‎already‏ ‎has ‎access‏ ‎to ‎the ‎system ‎to ‎gain‏ ‎higher‏ ‎privileges.

📌 Attack‏ ‎Vector ‎and‏ ‎Complexity: ‎The‏ ‎CVSS ‎3.1‏ ‎vector‏ ‎(CVSS: ‎3.1/AV:‏ ‎L/AC: ‎L/PR: ‎L/UI: ‎N/S: ‎U/C:‏ ‎H/I: ‎H/A:‏ ‎H)‏ ‎indicates ‎that ‎the‏ ‎attack ‎vector‏ ‎is ‎local ‎(AV: ‎L),‏ ‎meaning‏ ‎the ‎attacker‏ ‎needs ‎local‏ ‎access ‎to ‎the ‎host. ‎The‏ ‎attack‏ ‎complexity ‎is‏ ‎low ‎(AC:‏ ‎L), ‎and ‎no ‎user ‎interaction‏ ‎(UI:‏ ‎N)‏ ‎is ‎required.‏ ‎The ‎privileges‏ ‎required ‎are‏ ‎low‏ ‎(PR: ‎L),‏ ‎suggesting ‎that ‎an ‎attacker ‎with‏ ‎basic ‎user‏ ‎privileges‏ ‎can ‎exploit ‎this‏ ‎vulnerability.

📌 Impact: The ‎impacts‏ ‎on ‎confidentiality, ‎integrity, ‎and‏ ‎availability‏ ‎are ‎all‏ ‎rated ‎high‏ ‎(C: ‎H/I: ‎H/A: ‎H), ‎indicating‏ ‎that‏ ‎an ‎exploit‏ ‎could ‎lead‏ ‎to ‎a ‎complete ‎compromise ‎of‏ ‎the‏ ‎affected‏ ‎system’s ‎confidentiality,‏ ‎integrity, ‎and‏ ‎availability.

📌 Exploitation ‎Method: The‏ ‎vulnerability‏ ‎can ‎be‏ ‎exploited ‎through ‎symbolic ‎link ‎(symlink)‏ ‎attacks. ‎This‏ ‎involves‏ ‎manipulating ‎symbolic ‎links‏ ‎to ‎redirect‏ ‎operations ‎intended ‎for ‎legitimate‏ ‎files‏ ‎or ‎directories‏ ‎to ‎other‏ ‎targets, ‎which ‎the ‎attacker ‎controls.‏ ‎This‏ ‎can ‎lead‏ ‎to ‎arbitrary‏ ‎file ‎deletion ‎or ‎movement, ‎potentially‏ ‎allowing‏ ‎the‏ ‎attacker ‎to‏ ‎execute ‎arbitrary‏ ‎code ‎with‏ ‎elevated‏ ‎privileges.

📌 Specific ‎Mechanism: The‏ ‎vulnerability ‎specifically ‎involves ‎the ‎manipulation‏ ‎of ‎log‏ ‎files‏ ‎by ‎the ‎VirtualBox‏ ‎system ‎service‏ ‎(VboxSDS). ‎The ‎service, ‎which‏ ‎runs‏ ‎with ‎SYSTEM‏ ‎privileges, ‎manages‏ ‎log ‎files ‎in ‎a ‎directory‏ ‎that‏ ‎does ‎not‏ ‎have ‎strict‏ ‎access ‎controls. ‎This ‎allows ‎a‏ ‎low‏ ‎privileged‏ ‎user ‎to‏ ‎manipulate ‎these‏ ‎files, ‎potentially‏ ‎leading‏ ‎to ‎privilege‏ ‎escalation. ‎The ‎service ‎performs ‎file‏ ‎rename/move ‎operations‏ ‎recursively,‏ ‎and ‎if ‎manipulated‏ ‎correctly, ‎this‏ ‎behavior ‎can ‎be ‎abused‏ ‎to‏ ‎perform ‎unauthorized‏ ‎actions.

📌 Mitigation: Users ‎are‏ ‎advised ‎to ‎update ‎their ‎VirtualBox‏ ‎to‏ ‎version ‎7.0.16‏ ‎or ‎later,‏ ‎which ‎contains ‎the ‎necessary ‎patches‏ ‎to‏ ‎mitigate‏ ‎this ‎vulnerability






Читать: 4+ мин
logo Overkill Security

MS-DOS: For those who think modern OSes are too user-friendly

The ‎release‏ ‎of ‎the ‎MS-DOS ‎source ‎code is‏ ‎significant ‎for‏ ‎educational‏ ‎purposes, ‎historical ‎preservation,‏ ‎community ‎engagement,‏ ‎and ‎as ‎a ‎technical‏ ‎reference,‏ ‎making ‎it‏ ‎a ‎valuable‏ ‎resource ‎even ‎in ‎the ‎modern‏ ‎era.

Educational‏ ‎Value:

📌Learning ‎Tool: The‏ ‎source ‎code‏ ‎provides ‎a ‎valuable ‎resource ‎for‏ ‎students‏ ‎and‏ ‎new ‎programmers‏ ‎to ‎study‏ ‎the ‎fundamentals‏ ‎of‏ ‎operating ‎system‏ ‎development. ‎It ‎offers ‎insights ‎into‏ ‎low-level ‎programming,‏ ‎particularly‏ ‎in ‎assembly ‎language,‏ ‎which ‎is‏ ‎crucial ‎for ‎understanding ‎how‏ ‎early‏ ‎operating ‎systems‏ ‎managed ‎hardware‏ ‎and ‎resources. ‎Because ‎nothing ‎says‏ ‎«cutting-edge‏ ‎education» ‎like‏ ‎studying ‎an‏ ‎operating ‎system ‎that ‎predates ‎the‏ ‎internet.‏ ‎Who‏ ‎needs ‎Python‏ ‎or ‎JavaScript‏ ‎when ‎you‏ ‎can‏ ‎wrestle ‎with‏ ‎assembly ‎language?

📌Historical ‎Study: Researchers ‎and ‎historians‏ ‎can ‎analyze‏ ‎the‏ ‎code ‎to ‎understand‏ ‎the ‎evolution‏ ‎of ‎software ‎development ‎practices‏ ‎and‏ ‎the ‎technological‏ ‎advancements ‎of‏ ‎the ‎1980s ‎and ‎1990s.  ‎For‏ ‎those‏ ‎who ‎find‏ ‎ancient ‎relics‏ ‎fascinating, ‎like ‎archaeologists ‎of ‎the‏ ‎digital‏ ‎age.‏ ‎Why ‎study‏ ‎modern ‎software‏ ‎when ‎you‏ ‎can‏ ‎dig ‎through‏ ‎the ‎code ‎of ‎a ‎system‏ ‎that ‎ran‏ ‎on‏ ‎floppy ‎disks?

Preservation ‎of‏ ‎Digital ‎History:

📌Archival‏ ‎Importance: By ‎making ‎the ‎source‏ ‎code‏ ‎publicly ‎available,‏ ‎Microsoft ‎helps‏ ‎preserve ‎a ‎significant ‎piece ‎of‏ ‎computing‏ ‎history. ‎This‏ ‎ensures ‎that‏ ‎future ‎generations ‎can ‎access ‎and‏ ‎learn‏ ‎from‏ ‎the ‎software‏ ‎that ‎played‏ ‎a ‎pivotal‏ ‎role‏ ‎in ‎the‏ ‎personal ‎computing ‎revolution. ‎Because ‎preserving‏ ‎the ‎source‏ ‎code‏ ‎of ‎an ‎ancient‏ ‎OS ‎is‏ ‎clearly ‎more ‎important ‎than,‏ ‎say,‏ ‎addressing ‎climate‏ ‎change ‎or‏ ‎curing ‎diseases. ‎Future ‎generations ‎will‏ ‎surely‏ ‎thank ‎us‏ ‎for ‎this‏ ‎invaluable ‎contribution.

📌Documentation ‎of ‎Technological ‎Progress: The‏ ‎release‏ ‎includes‏ ‎not ‎just‏ ‎the ‎source‏ ‎code ‎but‏ ‎also‏ ‎original ‎documentation‏ ‎and ‎binaries, ‎providing ‎a ‎comprehensive‏ ‎view ‎of‏ ‎the‏ ‎software’s ‎development ‎and‏ ‎its ‎context‏ ‎within ‎the ‎broader ‎history‏ ‎of‏ ‎computing. ‎And‏ ‎to ‎show‏ ‎just ‎how ‎far ‎we’ve ‎come.‏ ‎Look,‏ ‎kids, ‎this‏ ‎is ‎what‏ ‎we ‎used ‎before ‎we ‎had‏ ‎smartphones‏ ‎and‏ ‎cloud ‎computing.‏ ‎Marvel ‎at‏ ‎the ‎simplicity!

Community‏ ‎Engagement‏ ‎and ‎Innovation:

📌Open-Source‏ ‎Contributions: The ‎release ‎under ‎the ‎MIT‏ ‎license ‎allows‏ ‎tech‏ ‎enthusiasts ‎and ‎developers‏ ‎to ‎explore,‏ ‎experiment, ‎and ‎potentially ‎repurpose‏ ‎the‏ ‎code ‎for‏ ‎modern ‎applications.‏ ‎This ‎can ‎lead ‎to ‎innovative‏ ‎uses‏ ‎of ‎old‏ ‎technology ‎in‏ ‎new ‎contexts. ‎For ‎all ‎those‏ ‎tech‏ ‎enthusiasts‏ ‎who ‎have‏ ‎nothing ‎better‏ ‎to ‎do‏ ‎than‏ ‎tinker ‎with‏ ‎obsolete ‎code. ‎Maybe ‎someone ‎will‏ ‎finally ‎figure‏ ‎out‏ ‎how ‎to ‎make‏ ‎MS-DOS ‎run‏ ‎on ‎a ‎smart ‎fridge.

📌Digital‏ ‎Archeology: Enthusiasts‏ ‎and ‎digital‏ ‎preservationists ‎can‏ ‎use ‎the ‎source ‎code ‎to‏ ‎run‏ ‎and ‎test‏ ‎the ‎software‏ ‎on ‎both ‎original ‎hardware ‎and‏ ‎modern‏ ‎emulators,‏ ‎ensuring ‎that‏ ‎the ‎knowledge‏ ‎and ‎functionality‏ ‎of‏ ‎MS-DOS ‎are‏ ‎not ‎lost. ‎Because ‎some ‎people‏ ‎just ‎can’t‏ ‎let‏ ‎go ‎of ‎the‏ ‎past. ‎Let’s‏ ‎spend ‎our ‎weekends ‎running‏ ‎MS-DOS‏ ‎on ‎emulators‏ ‎instead ‎of‏ ‎enjoying ‎modern ‎gaming ‎consoles.

Technical ‎Reference:

📌Understanding‏ ‎Legacy‏ ‎Systems: For ‎developers‏ ‎working ‎with‏ ‎legacy ‎systems ‎or ‎those ‎interested‏ ‎in‏ ‎the‏ ‎history ‎of‏ ‎software ‎engineering,‏ ‎the ‎MS-DOS‏ ‎source‏ ‎code ‎provides‏ ‎a ‎reference ‎for ‎how ‎early‏ ‎operating ‎systems‏ ‎were‏ ‎structured ‎and ‎functioned.‏ ‎This ‎can‏ ‎be ‎particularly ‎useful ‎for‏ ‎maintaining‏ ‎or ‎interfacing‏ ‎with ‎older‏ ‎systems ‎still ‎in ‎use ‎today.‏ ‎For‏ ‎those ‎poor‏ ‎souls ‎still‏ ‎maintaining ‎ancient ‎hardware ‎in ‎the‏ ‎backrooms‏ ‎of‏ ‎some ‎forgotten‏ ‎office. ‎It’s‏ ‎like ‎being‏ ‎a‏ ‎mechanic ‎for‏ ‎a ‎Model ‎T ‎in ‎the‏ ‎age ‎of‏ ‎electric‏ ‎cars.

📌Comparison ‎with ‎Modern‏ ‎Systems: Analyzing ‎the‏ ‎MS-DOS ‎source ‎code ‎allows‏ ‎for‏ ‎a ‎comparison‏ ‎with ‎modern‏ ‎operating ‎systems, ‎highlighting ‎the ‎advancements‏ ‎in‏ ‎software ‎engineering‏ ‎and ‎system‏ ‎design ‎over ‎the ‎past ‎few‏ ‎decades.‏ ‎To‏ ‎appreciate ‎how‏ ‎much ‎better‏ ‎we ‎have‏ ‎it‏ ‎now. ‎Look‏ ‎at ‎this, ‎kids, ‎and ‎be‏ ‎grateful ‎you‏ ‎don’t‏ ‎have ‎to ‎type‏ ‎commands ‎to‏ ‎open ‎a ‎file.


Читать: 5+ мин
logo Overkill Security

Human Factors in Biocybersecurity Wargames & Gamification

The ‎paper‏ ‎«Human ‎Factors ‎in ‎Biocybersecurity ‎Wargames»‏ ‎offers ‎a‏ ‎thrilling‏ ‎guide ‎to ‎safeguarding‏ ‎bioprocessing ‎centers.‏ ‎The ‎authors, ‎clearly ‎having‏ ‎too‏ ‎much ‎time‏ ‎on ‎their‏ ‎hands, ‎emphasize ‎the ‎«fast-paced» ‎nature‏ ‎of‏ ‎biological ‎and‏ ‎bioprocessing ‎developments.‏ ‎Labs, ‎whether ‎rolling ‎in ‎cash‏ ‎or‏ ‎scraping‏ ‎by, ‎are‏ ‎apparently ‎prime‏ ‎targets ‎for‏ ‎cyber‏ ‎mischief. ‎Who‏ ‎knew ‎that ‎underpaid ‎workers ‎and‏ ‎sub-standard ‎resources‏ ‎could‏ ‎be ‎security ‎risks?

The‏ ‎paper ‎also‏ ‎highlights ‎the ‎importance ‎of‏ ‎wargames.‏ ‎Yes, ‎wargames.‏ ‎Because ‎what‏ ‎better ‎way ‎to ‎prepare ‎for‏ ‎cyber‏ ‎threats ‎than‏ ‎by ‎playing‏ ‎pretend? ‎Participants ‎are ‎divided ‎into‏ ‎«data‏ ‎defenders»‏ ‎and ‎«data‏ ‎hackers, ‎»‏ ‎engaging ‎in‏ ‎a‏ ‎thrilling ‎game‏ ‎of ‎«find ‎the ‎vulnerability ‎and‏ ‎patch ‎it.»

In‏ ‎the‏ ‎discussion, ‎the ‎authors‏ ‎reveal ‎common‏ ‎exploitations ‎found ‎during ‎these‏ ‎wargames,‏ ‎such ‎as‏ ‎the ‎inefficiency‏ ‎of ‎security ‎theater ‎and ‎the‏ ‎security‏ ‎implications ‎of‏ ‎miscommunications. ‎Obviously,‏ ‎the ‎only ‎way ‎to ‎stay‏ ‎ahead‏ ‎in‏ ‎this ‎fast-paced‏ ‎field ‎is‏ ‎to ‎keep‏ ‎playing‏ ‎those ‎wargames‏ ‎and ‎staying ‎updated ‎on ‎the‏ ‎latest ‎trends.‏ ‎After‏ ‎all, ‎nothing ‎says‏ ‎«cutting-edge» ‎like‏ ‎a ‎thrilling ‎ride ‎through‏ ‎the‏ ‎world ‎of‏ ‎cyber ‎threats,‏ ‎complete ‎with ‎all ‎the ‎excitement‏ ‎of‏ ‎a ‎board‏ ‎game ‎night.

----

The‏ ‎paper ‎«Human ‎Factors ‎in ‎Biocybersecurity‏ ‎Wargames»‏ ‎emphasizes‏ ‎the ‎need‏ ‎to ‎understand‏ ‎vulnerabilities ‎in‏ ‎the‏ ‎processing ‎of‏ ‎biologics ‎and ‎how ‎they ‎intersect‏ ‎with ‎cyber‏ ‎and‏ ‎cyber-physical ‎systems. ‎This‏ ‎understanding ‎is‏ ‎crucial ‎for ‎ensuring ‎product‏ ‎and‏ ‎brand ‎integrity‏ ‎and ‎protecting‏ ‎those ‎served ‎by ‎these ‎systems.‏ ‎It‏ ‎discusses ‎the‏ ‎growing ‎prominence‏ ‎of ‎biocybersecurity ‎and ‎its ‎importance‏ ‎to‏ ‎bioprocessing‏ ‎in ‎both‏ ‎domestic ‎and‏ ‎international ‎contexts.


Scope‏ ‎of‏ ‎Bioprocessing:

📌 Bioprocessing ‎encompasses‏ ‎the ‎entire ‎lifecycle ‎of ‎biosystems‏ ‎and ‎their‏ ‎components,‏ ‎from ‎initial ‎research‏ ‎to ‎development,‏ ‎manufacturing, ‎and ‎commercialization.

📌 It ‎significantly‏ ‎contributes‏ ‎to ‎the‏ ‎global ‎economy,‏ ‎with ‎applications ‎in ‎food, ‎fuel,‏ ‎cosmetics,‏ ‎drugs, ‎and‏ ‎green ‎technology.

Vulnerability‏ ‎of ‎Bioprocessing ‎Pipelines:

📌 The ‎bioprocessing ‎pipeline‏ ‎is‏ ‎susceptible‏ ‎to ‎attacks‏ ‎at ‎various‏ ‎stages, ‎especially‏ ‎where‏ ‎bioprocessing ‎equipment‏ ‎interfaces ‎with ‎the ‎internet.

📌 This ‎vulnerability‏ ‎necessitates ‎enhanced‏ ‎scrutiny‏ ‎in ‎the ‎design‏ ‎and ‎monitoring‏ ‎of ‎bioprocessing ‎pipelines ‎to‏ ‎prevent‏ ‎potential ‎disruptions.

Role‏ ‎of ‎Information‏ ‎Technology ‎(IT):

📌 Progress ‎in ‎bioprocessing ‎is‏ ‎increasingly‏ ‎dependent ‎on‏ ‎automation ‎and‏ ‎advanced ‎algorithmic ‎processes, ‎which ‎require‏ ‎substantial‏ ‎IT‏ ‎engagement.

📌 IT ‎spending‏ ‎is ‎substantial‏ ‎and ‎growing,‏ ‎paralleling‏ ‎the ‎growth‏ ‎in ‎bioprocessing.

Open-Source ‎Methodologies ‎and ‎Digital‏ ‎Growth:

📌 The ‎adoption‏ ‎of‏ ‎open-source ‎methodologies ‎has‏ ‎led ‎to‏ ‎significant ‎growth ‎in ‎communication‏ ‎and‏ ‎digital ‎technology‏ ‎development ‎worldwide.

📌 This‏ ‎growth ‎is ‎further ‎accelerated ‎by‏ ‎advancements‏ ‎in ‎biological‏ ‎computing ‎and‏ ‎storage ‎technologies.

Need ‎for ‎New ‎Expertise:

📌 The‏ ‎integration‏ ‎of‏ ‎biocomputing, ‎bioprocessing,‏ ‎and ‎storage‏ ‎technologies ‎will‏ ‎necessitate‏ ‎new ‎expertise‏ ‎in ‎both ‎operation ‎and ‎defense.

📌 Basic‏ ‎data ‎and‏ ‎process‏ ‎protection ‎measures ‎remain‏ ‎crucial ‎despite‏ ‎technological ‎advancements.

Importance ‎of ‎Wargames:

📌 To‏ ‎manage‏ ‎and ‎secure‏ ‎connected ‎bioprocessing‏ ‎infrastructure, ‎IT ‎teams ‎must ‎employ‏ ‎wargames‏ ‎to ‎simulate‏ ‎and ‎address‏ ‎potential ‎risks.

📌 These ‎simulations ‎are ‎essential‏ ‎for‏ ‎preparing‏ ‎organizations ‎to‏ ‎handle ‎vulnerabilities‏ ‎in ‎their‏ ‎bioprocessing‏ ‎pipelines.


Unpacking ‎in‏ ‎more ‎detail



Читать: 3+ мин
logo Overkill Security

Why Bother with Cybersecurity? Just Let Event Logs Do All the Work, Google said

By ‎leveraging Windows‏ ‎Event ‎Logs ‎and ‎integrating ‎with‏ ‎advanced ‎detection‏ ‎systems,‏ ‎organizations ‎can ‎better‏ ‎protect ‎themselves‏ ‎against ‎the ‎growing ‎threat‏ ‎of‏ ‎browser ‎data‏ ‎theft.

Technical ‎Keypoints

📌Windows‏ ‎Event ‎Logs: The ‎method ‎leverages ‎Windows‏ ‎Event‏ ‎Logs ‎to‏ ‎detect ‎suspicious‏ ‎activities ‎that ‎may ‎indicate ‎browser‏ ‎data‏ ‎theft.‏ ‎This ‎includes‏ ‎monitoring ‎specific‏ ‎event ‎IDs‏ ‎and‏ ‎patterns ‎that‏ ‎are ‎indicative ‎of ‎malicious ‎behavior.

📌Event‏ ‎IDs: ‎Key‏ ‎event‏ ‎IDs ‎to ‎monitor‏ ‎include ‎Event‏ ‎ID ‎4688 ‎to ‎Tracks‏ ‎process‏ ‎creation, ‎which‏ ‎can ‎help‏ ‎identify ‎when ‎a ‎browser ‎or‏ ‎related‏ ‎process ‎is‏ ‎started; ‎Event‏ ‎ID ‎5145 ‎to ‎Monitors ‎file‏ ‎access,‏ ‎which‏ ‎can ‎be‏ ‎used ‎to‏ ‎detect ‎unauthorized‏ ‎access‏ ‎to ‎browser‏ ‎data ‎files; ‎and ‎Event ‎ID‏ ‎4663 ‎to‏ ‎Tracks‏ ‎object ‎access, ‎useful‏ ‎for ‎identifying‏ ‎attempts ‎to ‎read ‎or‏ ‎modify‏ ‎browser ‎data‏ ‎files.

📌Behavioral ‎Analysis: The‏ ‎approach ‎involves ‎analyzing ‎the ‎behavior‏ ‎of‏ ‎processes ‎and‏ ‎their ‎interactions‏ ‎with ‎browser ‎data ‎files. ‎This‏ ‎includes‏ ‎looking‏ ‎for ‎unusual‏ ‎patterns ‎such‏ ‎as ‎processes‏ ‎that‏ ‎do ‎not‏ ‎typically ‎access ‎browser ‎data ‎files‏ ‎suddenly ‎doing‏ ‎so,‏ ‎high ‎frequency ‎of‏ ‎access ‎to‏ ‎browser ‎data ‎files ‎by‏ ‎non-browser‏ ‎processes.

📌Integration ‎with‏ ‎SIEM: ‎The‏ ‎method ‎can ‎be ‎integrated ‎with‏ ‎Security‏ ‎Information ‎and‏ ‎Event ‎Management‏ ‎(SIEM) ‎systems ‎to ‎automate ‎the‏ ‎detection‏ ‎and‏ ‎alerting ‎process.‏ ‎This ‎allows‏ ‎for ‎real-time‏ ‎monitoring‏ ‎and ‎quicker‏ ‎response ‎to ‎potential ‎data ‎theft‏ ‎incidents.

📌Machine ‎Learning:‏ ‎The‏ ‎use ‎of ‎machine‏ ‎learning ‎models‏ ‎to ‎enhance ‎detection ‎capabilities‏ ‎by‏ ‎identifying ‎anomalies‏ ‎and ‎patterns‏ ‎that ‎are ‎not ‎easily ‎detectable‏ ‎through‏ ‎rule-based ‎systems‏ ‎alone.

Impact ‎on‏ ‎Industries

📌Enhanced ‎Security ‎Posture: By ‎implementing ‎this‏ ‎detection‏ ‎method,‏ ‎organizations ‎can‏ ‎significantly ‎enhance‏ ‎their ‎security‏ ‎posture‏ ‎against ‎browser‏ ‎data ‎theft. ‎This ‎is ‎particularly‏ ‎important ‎for‏ ‎industries‏ ‎that ‎handle ‎sensitive‏ ‎information, ‎such‏ ‎as ‎finance, ‎healthcare, ‎and‏ ‎legal‏ ‎sectors.

📌Compliance ‎and‏ ‎Regulatory ‎Requirements: Many‏ ‎industries ‎are ‎subject ‎to ‎strict‏ ‎compliance‏ ‎and ‎regulatory‏ ‎requirements ‎regarding‏ ‎data ‎protection. ‎This ‎method ‎helps‏ ‎organizations‏ ‎meet‏ ‎these ‎requirements‏ ‎by ‎providing‏ ‎a ‎robust‏ ‎mechanism‏ ‎for ‎detecting‏ ‎and ‎preventing ‎data ‎breaches.

📌Incident ‎Response:‏ ‎The ‎ability‏ ‎to‏ ‎detect ‎browser ‎data‏ ‎theft ‎in‏ ‎real-time ‎allows ‎for ‎quicker‏ ‎incident‏ ‎response, ‎minimizing‏ ‎the ‎potential‏ ‎damage ‎and ‎reducing ‎the ‎time‏ ‎attackers‏ ‎have ‎access‏ ‎to ‎sensitive‏ ‎data.

📌Cost ‎Savings: ‎Early ‎detection ‎and‏ ‎prevention‏ ‎of‏ ‎data ‎theft‏ ‎can ‎lead‏ ‎to ‎significant‏ ‎cost‏ ‎savings ‎by‏ ‎avoiding ‎the ‎financial ‎and ‎reputational‏ ‎damage ‎associated‏ ‎with‏ ‎data ‎breaches.

📌Trust ‎and‏ ‎Reputation: ‎For‏ ‎industries ‎that ‎rely ‎heavily‏ ‎on‏ ‎customer ‎trust,‏ ‎such ‎as‏ ‎e-commerce ‎and ‎online ‎services, ‎demonstrating‏ ‎a‏ ‎strong ‎commitment‏ ‎to ‎data‏ ‎security ‎can ‎enhance ‎reputation ‎and‏ ‎customer‏ ‎confidence.


Читать: 3+ мин
logo Overkill Security

Nimfilt: Because Authors Needed Another Language to Complicate Our Lives

Key ‎Features

📌Function‏ ‎and ‎Package ‎Names: ‎Nimfilt ‎demangles‏ ‎Nim-specific ‎function‏ ‎and‏ ‎package ‎names, ‎making‏ ‎them ‎more‏ ‎readable ‎and ‎easier ‎to‏ ‎analyze.

📌Package‏ ‎Init ‎Function‏ ‎Names: ‎It‏ ‎also ‎demangles ‎the ‎initialization ‎function‏ ‎names‏ ‎of ‎Nim‏ ‎packages.

📌Nim ‎Strings:‏ ‎Nimfilt ‎applies ‎C-style ‎structs ‎to‏ ‎Nim‏ ‎strings,‏ ‎which ‎helps‏ ‎in ‎interpreting‏ ‎the ‎data‏ ‎structures‏ ‎within ‎the‏ ‎binary. ‎This ‎includes ‎identifying ‎the‏ ‎length ‎and‏ ‎payload‏ ‎of ‎the ‎strings.

📌IDA‏ ‎Plugin: ‎Nimfilt‏ ‎can ‎be ‎used ‎as‏ ‎an‏ ‎IDA ‎plugin,‏ ‎where ‎it‏ ‎organizes ‎functions ‎into ‎directories ‎based‏ ‎on‏ ‎their ‎package‏ ‎name ‎or‏ ‎path. ‎This ‎helps ‎in ‎structuring‏ ‎the‏ ‎analysis‏ ‎process.

📌Automatic ‎Execution:‏ ‎The ‎plugin‏ ‎can ‎be‏ ‎set‏ ‎to ‎automatically‏ ‎execute ‎when ‎a ‎Nim ‎binary‏ ‎is ‎loaded‏ ‎by‏ ‎setting ‎the ‎AUTO_RUN‏ ‎global ‎variable‏ ‎to ‎True.

📌Identifying ‎Nim ‎Binaries:‏ ‎Nimfilt‏ ‎uses ‎heuristics‏ ‎to ‎identify‏ ‎if ‎a ‎loaded ‎file ‎is‏ ‎a‏ ‎Nim ‎binary‏ ‎by ‎checking‏ ‎for ‎specific ‎strings ‎and ‎function‏ ‎names‏ ‎associated‏ ‎with ‎Nim.

📌YARA‏ ‎Rules: ‎It‏ ‎includes ‎YARA‏ ‎rules‏ ‎to ‎identify‏ ‎Nim-compiled ‎ELF ‎and ‎PE ‎binaries.

📌Command‏ ‎Line ‎Interface‏ ‎(CLI):‏ ‎Python ‎Script: ‎Nimfilt‏ ‎can ‎be‏ ‎run ‎as ‎a ‎Python‏ ‎script‏ ‎on ‎the‏ ‎command ‎line,‏ ‎providing ‎a ‎subset ‎of ‎its‏ ‎functionality‏ ‎outside ‎of‏ ‎IDA.

📌Organizing ‎Functions: Directory‏ ‎Structure: ‎In ‎IDA, ‎Nimfilt ‎creates‏ ‎directories‏ ‎in‏ ‎the ‎Functions‏ ‎window ‎to‏ ‎organize ‎functions‏ ‎according‏ ‎to ‎their‏ ‎package ‎name ‎or ‎path, ‎enhancing‏ ‎the ‎readability‏ ‎and‏ ‎manageability ‎of ‎the‏ ‎analysis.

Scenarios

Nimfilt ‎has‏ ‎been ‎employed ‎in ‎various‏ ‎real-world‏ ‎scenarios, ‎particularly‏ ‎in ‎the‏ ‎analysis ‎of ‎malware ‎written ‎in‏ ‎the‏ ‎Nim ‎programming‏ ‎language.

Sednit ‎Group:

📌Background: The‏ ‎Sednit ‎group, ‎also ‎known ‎as‏ ‎APT28‏ ‎or‏ ‎Fancy ‎Bear,‏ ‎is ‎a‏ ‎well-known ‎cyber-espionage‏ ‎group.‏ ‎They ‎have‏ ‎been ‎active ‎since ‎at ‎least‏ ‎2004 ‎and‏ ‎are‏ ‎responsible ‎for ‎several‏ ‎high-profile ‎attacks,‏ ‎including ‎the ‎Democratic ‎National‏ ‎Committee‏ ‎(DNC) ‎hack‏ ‎in ‎2016.

📌Use‏ ‎of ‎Nim: In ‎2019, ‎Sednit ‎was‏ ‎observed‏ ‎using ‎a‏ ‎malicious ‎downloader‏ ‎written ‎in ‎Nim. ‎This ‎marked‏ ‎one‏ ‎of‏ ‎the ‎early‏ ‎instances ‎of‏ ‎Nim ‎being‏ ‎used‏ ‎in ‎malware‏ ‎development.

📌Nimfilt’s ‎Role: Nimfilt ‎was ‎used ‎to‏ ‎reverse-engineer ‎this‏ ‎Nim-compiled‏ ‎malware, ‎helping ‎analysts‏ ‎understand ‎the‏ ‎structure ‎and ‎functionality ‎of‏ ‎the‏ ‎downloader ‎by‏ ‎demangling ‎function‏ ‎and ‎package ‎names ‎and ‎applying‏ ‎appropriate‏ ‎data ‎structures‏ ‎to ‎strings.

Mustang‏ ‎Panda ‎APT ‎Group:

📌Background: ‎Mustang ‎Panda‏ ‎is‏ ‎a‏ ‎China-aligned ‎Advanced‏ ‎Persistent ‎Threat‏ ‎(APT) ‎group‏ ‎known‏ ‎for ‎its‏ ‎cyber-espionage ‎activities. ‎They ‎have ‎been‏ ‎using ‎Nim‏ ‎to‏ ‎create ‎custom ‎loaders‏ ‎for ‎their‏ ‎Korplug ‎backdoor.

📌Specific ‎Incident: In ‎August‏ ‎2023,‏ ‎Mustang ‎Panda‏ ‎used ‎a‏ ‎malicious ‎DLL ‎written ‎in ‎Nim‏ ‎as‏ ‎part ‎of‏ ‎their ‎campaign‏ ‎against ‎a ‎governmental ‎organization ‎in‏ ‎Slovakia.‏ ‎This‏ ‎DLL ‎was‏ ‎part ‎of‏ ‎their ‎classic‏ ‎trident‏ ‎Korplug ‎loader.

📌Nimfilt’s‏ ‎Role: ‎Nimfilt ‎was ‎instrumental ‎in‏ ‎analyzing ‎this‏ ‎DLL.‏ ‎By ‎demangling ‎the‏ ‎names ‎and‏ ‎organizing ‎functions ‎into ‎directories,‏ ‎Nimfilt‏ ‎made ‎it‏ ‎easier ‎for‏ ‎researchers ‎to ‎dissect ‎the ‎malware‏ ‎and‏ ‎understand ‎its‏ ‎behavior.

General ‎Malware‏ ‎Analysis:

📌Nim’s ‎Popularity: The ‎Nim ‎programming ‎language‏ ‎has‏ ‎become‏ ‎increasingly ‎attractive‏ ‎to ‎malware‏ ‎developers ‎due‏ ‎to‏ ‎its ‎robust‏ ‎compiler ‎and ‎ability ‎to ‎work‏ ‎seamlessly ‎with‏ ‎other‏ ‎languages ‎like ‎C,‏ ‎C++, ‎and‏ ‎JavaScript. ‎This ‎has ‎led‏ ‎to‏ ‎a ‎rise‏ ‎in ‎malware‏ ‎written ‎in ‎Nim.

📌Nimfilt’s ‎Contribution: For ‎researchers‏ ‎tasked‏ ‎with ‎reverse-engineering‏ ‎such ‎binaries,‏ ‎Nimfilt ‎provides ‎a ‎powerful ‎tool‏ ‎to‏ ‎speed‏ ‎up ‎the‏ ‎analysis ‎process.‏ ‎It ‎helps‏ ‎by‏ ‎demangling ‎names,‏ ‎applying ‎structs ‎to ‎strings, ‎and‏ ‎organizing ‎functions,‏ ‎thereby‏ ‎making ‎the ‎reverse-engineering‏ ‎process ‎more‏ ‎efficient ‎and ‎focused.

Показать еще

Обновления проекта

Метки

overkillsecurity 93 overkillsecuritypdf 46 news 45 vulnerability 9 malware 8 research 8 IoT 7 Cyber Attacks 6 Digest 6 Monthly Digest 6 phishing 6 unpacking 6 Forensics 5 Ransomware 5 nsa 4 Energy Consumption 3 fbi 3 IoMT 3 medical 3 ai 2 authentication 2 av 2 battery 2 Buffer Overflow 2 console architecture 2 cve 2 cyber security 2 energy 2 Google 2 incident response 2 MITM 2 mqtt 2 Passkeys 2 Retro 2 Velociraptor 2 Vintage 2 vmware 2 windows 2 1981 1 5g network research 1 8-bit 1 Ad Removal 1 Ad-Free Experience 1 adapt tactics 1 ADCS 1 AlphV 1 AMSI 1 android 1 Android15 1 AnonSudan 1 antiPhishing 1 AntiPhishStack 1 antivirus 1 Apple 1 Atlassian 1 Attack 1 AttackGen 1 BatBadBut 1 Behavioral Analytics 1 BianLian 1 bias 1 Biocybersecurity 1 Biometric 1 bite 1 bitlocker 1 bitlocker bypass 1 Black Lotus Labs 1 blizzard 1 botnet 1 Browser Data Theft 1 BucketLoot 1 CellularSecurity 1 checkpoint 1 china 1 chisel 1 CloudSecurity 1 CloudStorage 1 content 1 content category 1 cpu 1 Credential Dumping 1 CVE-2023-22518 1 CVE-2023-35080 1 CVE-2023-38043 1 CVE-2023-38543 1 CVE-2024-0204 1 CVE-2024-21111 1 CVE-2024-21345 1 cve-2024-21447 1 CVE-2024-24919 1 CVE-2024-26218 1 cve-2024-27129 1 cve-2024-27130 1 cve-2024-27131 1 cve-2024-3400 1 cvss 1 Cyber Toufan Al-Aqsa 1 cybersecurity 1 D-Link 1 dark pink apt 1 data leakage 1 dcrat 1 Demoscene 1 DevSecOps 1 Dex 1 disassembler 1 DOS 1 edge routers 1 EDR 1 Embedded systems 1 Employee Training 1 EntraID 1 ESC8 1 Essential Eight Maturity Model 1 Event ID 4663 1 Event ID 4688 1 Event ID 5145 1 Evilginx 1 EvilLsassTwin 1 Facebook 1 FBI IC3 1 FIDO2 1 Firebase 1 Firmware 1 Fortra's GoAnywhere MFT 1 france 1 FraudDetection 1 fuxnet 1 game console 1 gamification 1 GeminiNanoAI 1 genzai 1 go 1 GoogleIO2024 1 GooglePlayProtect 1 GoPhish 1 gpu 1 ICS 1 ICSpector 1 IDA 1 IncidentResponse 1 Industrial Control Systems 1 jetbrains 1 KASLR 1 KillNet 1 LeftOverLocals 1 lg smart tv 1 Living Off the Land 1 lockbit 1 LOTL 1 LSASS 1 m-trends 1 Machine Learning Integration 1 Mallox 1 MalPurifier 1 mandiant 1 Maturity Model 1 MediHunt 1 Meta Pixel 1 ML 1 mobile network analysis 1 nes 1 nexus 1 Nim 1 Nimfilt 1 NtQueryInformationThread 1 OFGB 1 oracle 1 paid content 1 panos 1 Passwordless 1 Phishing Resilience 1 PingFederate 1 Platform Lock-in Tool 1 PlayIntegrityAPI 1 PlayStation 1 playstation 2 1 playstation 3 1 plc 1 Privilege Escalation 1 ps2 1 ps3 1 PulseVPN 1 qcsuper 1 qemu 1 qualcomm diag protocol 1 radio frame capture 1 Raytracing 1 Real-time Attack Detection 1 Red Team 1 Registry Modification 1 Risk Mitigation 1 RiskManagement 1 rodrigo copetti 1 rooted android devices 1 Router 1 rust 1 Sagemcom 1 sandworm 1 ScamCallDetection 1 Security Awareness 1 session hijacking 1 SharpADWS 1 SharpTerminator 1 shellcode 1 SIEM 1 Siemens 1 skimming 1 Smart Devices 1 snes 1 soho 1 SSO 1 stack overflow 1 TA547 1 TDDP 1 telecom security 1 Telegram 1 telerik 1 TeleTracker 1 Terminator 1 Threat 1 threat intelligence 1 threat intelligence analysis 1 Threat Simulation 1 tool 1 toolkit 1 tp-link 1 ubiquiti 1 UK 1 UserManagerEoP 1 uta0218 1 virtualbox 1 VPN 1 vu 1 wargame 1 Web Authentication 1 WebAuthn 1 webos 1 What2Log 1 Windows 11 1 Windows Kernel 1 Windstream 1 women 1 WSUS 1 wt-2024-0004 1 wt-2024-0005 1 wt-2024-0006 1 xbox 1 xbox 360 1 xbox original 1 xss 1 Yubico 1 Z80A 1 ZX Spectrum 1 Больше тегов

Фильтры

Подарить подписку

Будет создан код, который позволит адресату получить бесплатный для него доступ на определённый уровень подписки.

Оплата за этого пользователя будет списываться с вашей карты вплоть до отмены подписки. Код может быть показан на экране или отправлен по почте вместе с инструкцией.

Будет создан код, который позволит адресату получить сумму на баланс.

Разово будет списана указанная сумма и зачислена на баланс пользователя, воспользовавшегося данным промокодом.

Добавить карту
0/2048